Source: 00000006.00000002.1562100020.000000000154A000.00000004.00000020.00020000.00000000.sdmp | Malware Configuration Extractor: Remcos {"Host:Port:Password": ["00.dynamic-dns.net:2195:1"], "Assigned name": "2", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Rmc-AJ9FFW", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"} |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000006.00000002.1562100020.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1575370047.0000000003B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.3880640441.000000000068A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: payment receipt copy.bat.exe PID: 7560, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 7660, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ShouldExitCurrentIteration.exe PID: 7920, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 8012, type: MEMORYSTR |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: payment receipt copy.bat.exe, 00000000.00000002.1436717336.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003CB0000.00000004.00000800.00020000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003A0D000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: payment receipt copy.bat.exe, 00000000.00000002.1436717336.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003CB0000.00000004.00000800.00020000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003A0D000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdbSHA256}Lq source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdb source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0056BA59 FindFirstFileExA, | 2_2_0056BA59 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00527848 FindFirstFileW,FindNextFileW,FindClose, | 2_2_00527848 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0053A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 2_2_0053A01B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005268CD FindFirstFileW,FindNextFileW, | 2_2_005268CD |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0052AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 2_2_0052AA71 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0052B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 2_2_0052B28E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00537AAB FindFirstFileW, | 2_2_00537AAB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005287A0 FindFirstFileW,FindNextFileW,FindClose,FindClose, | 2_2_005287A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 6_2_0041A01B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 6_2_0040B28E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 6_2_0040838E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 6_2_004087A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 6_2_00407848 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004068CD FindFirstFileW,FindNextFileW, | 6_2_004068CD |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0044BA59 FindFirstFileExA, | 6_2_0044BA59 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 6_2_0040AA71 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW, | 6_2_00417AAB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 6_2_0040AC78 |
Source: InstallUtil.exe | String found in binary or memory: http://geoplugin.net/json.gp |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.3879800075.0000000000588000.00000002.00000400.00020000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003B8B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: InstallUtil.exe, 00000002.00000002.3880864994.00000000006D1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp6 |
Source: InstallUtil.exe, 00000002.00000002.3880864994.00000000006B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp634 |
Source: InstallUtil.exe, 00000002.00000002.3880864994.00000000006B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpKq |
Source: InstallUtil.exe, 00000002.00000002.3880640441.000000000068A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpM |
Source: InstallUtil.exe, 00000002.00000002.3880864994.00000000006B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpkp~ |
Source: payment receipt copy.bat.exe, 00000000.00000002.1425125548.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1563793582.0000000002941000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.00000000039CB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: payment receipt copy.bat.exe, 00000000.00000002.1425125548.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1563793582.0000000002941000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000006.00000002.1562100020.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1575370047.0000000003B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.3880640441.000000000068A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: payment receipt copy.bat.exe PID: 7560, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 7660, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ShouldExitCurrentIteration.exe PID: 7920, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 8012, type: MEMORYSTR |
Source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen |
Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE | Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen |
Source: 00000005.00000002.1575370047.0000000003B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000000.00000002.1433294002.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.3879800075.0000000000588000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen |
Source: Process Memory Space: payment receipt copy.bat.exe PID: 7560, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: InstallUtil.exe PID: 7660, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: ShouldExitCurrentIteration.exe PID: 7920, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: InstallUtil.exe PID: 8012, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_00F6CA60 | 0_2_00F6CA60 |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_00F68A10 | 0_2_00F68A10 |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_00F68A01 | 0_2_00F68A01 |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_00F690A0 | 0_2_00F690A0 |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_00F69091 | 0_2_00F69091 |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_00F6DD30 | 0_2_00F6DD30 |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_06740040 | 0_2_06740040 |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_06740007 | 0_2_06740007 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0055D9CC | 2_2_0055D9CC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00555286 | 2_2_00555286 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005713D4 | 2_2_005713D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0055DBFB | 2_2_0055DBFB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00553C0B | 2_2_00553C0B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0057050B | 2_2_0057050B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00554D8A | 2_2_00554D8A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0055DE2A | 2_2_0055DE2A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005516FB | 2_2_005516FB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0055569E | 2_2_0055569E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00563700 | 2_2_00563700 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00545152 | 2_2_00545152 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00545964 | 2_2_00545964 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00544BC3 | 2_2_00544BC3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005457FB | 2_2_005457FB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0053B917 | 2_2_0053B917 |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Code function: 5_2_00B98A10 | 5_2_00B98A10 |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Code function: 5_2_00B9CA60 | 5_2_00B9CA60 |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Code function: 5_2_00B98A01 | 5_2_00B98A01 |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Code function: 5_2_00B990A0 | 5_2_00B990A0 |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Code function: 5_2_00B99091 | 5_2_00B99091 |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Code function: 5_2_00B9DD30 | 5_2_00B9DD30 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00425152 | 6_2_00425152 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00435286 | 6_2_00435286 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004513D4 | 6_2_004513D4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0045050B | 6_2_0045050B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00436510 | 6_2_00436510 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004316FB | 6_2_004316FB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0043569E | 6_2_0043569E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00443700 | 6_2_00443700 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004257FB | 6_2_004257FB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004128E3 | 6_2_004128E3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00425964 | 6_2_00425964 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0041B917 | 6_2_0041B917 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0043D9CC | 6_2_0043D9CC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00435AD3 | 6_2_00435AD3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00424BC3 | 6_2_00424BC3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0043DBFB | 6_2_0043DBFB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0044ABA9 | 6_2_0044ABA9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00433C0B | 6_2_00433C0B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00434D8A | 6_2_00434D8A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0043DE2A | 6_2_0043DE2A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0041CEAF | 6_2_0041CEAF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00435F08 | 6_2_00435F08 |
Source: payment receipt copy.bat.exe, 00000000.00000002.1425125548.0000000002D41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1424433261.0000000000F8E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1436717336.0000000005F70000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameGhtlmhevtpb.dll" vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1435835208.0000000005D90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameXaunl.exe, vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000000.1413668538.00000000008B8000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameXaunl.exe, vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe, 00000000.00000002.1434705563.00000000058F0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameGhtlmhevtpb.dll" vs payment receipt copy.bat.exe |
Source: payment receipt copy.bat.exe | Binary or memory string: OriginalFilenameXaunl.exe, vs payment receipt copy.bat.exe |
Source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
Source: 00000005.00000002.1575370047.0000000003B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000000.00000002.1433294002.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.3879800075.0000000000588000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
Source: Process Memory Space: payment receipt copy.bat.exe PID: 7560, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: InstallUtil.exe PID: 7660, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: ShouldExitCurrentIteration.exe PID: 7920, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: InstallUtil.exe PID: 8012, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, TaskFolder.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, TaskSecurity.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, TaskSecurity.cs | Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, TaskPrincipal.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, User.cs | Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, Task.cs | Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: unknown | Process created: C:\Users\user\Desktop\payment receipt copy.bat.exe "C:\Users\user\Desktop\payment receipt copy.bat.exe" | |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ShouldExitCurrentIteration.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe "C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe" | |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe "C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: payment receipt copy.bat.exe, 00000000.00000002.1436717336.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003CB0000.00000004.00000800.00020000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003A0D000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: payment receipt copy.bat.exe, 00000000.00000002.1436717336.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003CB0000.00000004.00000800.00020000.00000000.sdmp, ShouldExitCurrentIteration.exe, 00000005.00000002.1575370047.0000000003A0D000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdbSHA256}Lq source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdb source: payment receipt copy.bat.exe, 00000000.00000002.1433294002.0000000003FDB000.00000004.00000800.00020000.00000000.sdmp, payment receipt copy.bat.exe, 00000000.00000002.1435504850.0000000005CF0000.00000004.08000000.00040000.00000000.sdmp |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.payment receipt copy.bat.exe.5f70000.6.raw.unpack, XmlSerializationHelper.cs | .Net Code: ReadObjectProperties |
Source: 0.2.payment receipt copy.bat.exe.5cf0000.4.raw.unpack, TypeModel.cs | .Net Code: TryDeserializeList |
Source: 0.2.payment receipt copy.bat.exe.5cf0000.4.raw.unpack, ListDecorator.cs | .Net Code: Read |
Source: 0.2.payment receipt copy.bat.exe.5cf0000.4.raw.unpack, TypeSerializer.cs | .Net Code: CreateInstance |
Source: 0.2.payment receipt copy.bat.exe.5cf0000.4.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateInstance |
Source: 0.2.payment receipt copy.bat.exe.5cf0000.4.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateIfNull |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Code function: 0_2_06747108 push edx; ret | 0_2_0674710B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005742E6 push ecx; ret | 2_2_005742F9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00552BD6 push ecx; ret | 2_2_00552BE9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00574C08 push eax; ret | 2_2_00574C26 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0056B506 push esp; retf | 2_2_0056B507 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0056AF08 push esp; retf | 2_2_0056AF10 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00542764 push esi; ret | 2_2_00542766 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0053529F pushfd ; retf | 2_2_005352A6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00534BD5 push edx; retf | 2_2_00534BD6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00528724 push esi; ret | 2_2_00528728 |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Code function: 5_2_00B910CD pushfd ; iretd | 5_2_00B910D6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004000D8 push es; iretd | 6_2_004000D9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040008C push es; iretd | 6_2_0040008D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004542E6 push ecx; ret | 6_2_004542F9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0045B4FD push esi; ret | 6_2_0045B506 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00432BD6 push ecx; ret | 6_2_00432BE9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00454C08 push eax; ret | 6_2_00454C26 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00553C0B GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 2_2_00553C0B |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe TID: 7596 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe TID: 7600 | Thread sleep count: 199 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\payment receipt copy.bat.exe TID: 7652 | Thread sleep count: 99 > 30 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7672 | Thread sleep count: 3286 > 30 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7672 | Thread sleep time: -9858000s >= -30000s | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7672 | Thread sleep count: 6704 > 30 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7672 | Thread sleep time: -20112000s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe TID: 7956 | Thread sleep time: -1844674407370954s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe TID: 7960 | Thread sleep count: 197 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ShouldExitCurrentIteration.exe TID: 7960 | Thread sleep count: 99 > 30 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0056BA59 FindFirstFileExA, | 2_2_0056BA59 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00527848 FindFirstFileW,FindNextFileW,FindClose, | 2_2_00527848 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0053A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 2_2_0053A01B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005268CD FindFirstFileW,FindNextFileW, | 2_2_005268CD |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0052AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 2_2_0052AA71 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_0052B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 2_2_0052B28E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00537AAB FindFirstFileW, | 2_2_00537AAB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005287A0 FindFirstFileW,FindNextFileW,FindClose,FindClose, | 2_2_005287A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 6_2_0041A01B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 6_2_0040B28E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 6_2_0040838E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 6_2_004087A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 6_2_00407848 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004068CD FindFirstFileW,FindNextFileW, | 6_2_004068CD |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0044BA59 FindFirstFileExA, | 6_2_0044BA59 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 6_2_0040AA71 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW, | 6_2_00417AAB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 6_2_0040AC78 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005528FC SetUnhandledExceptionFilter, | 2_2_005528FC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005598AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_005598AC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_00552D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 2_2_00552D5C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005527AD IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_005527AD |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 2_2_005527AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_005527AE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 6_2_004327AE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004328FC SetUnhandledExceptionFilter, | 6_2_004328FC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 6_2_004398AC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: 6_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 6_2_00432D5C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 2_2_0056F17B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 2_2_00565914 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 2_2_0056F130 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 2_2_0056F216 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW, | 2_2_0056F4F3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW, | 2_2_0056F4E9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW, | 2_2_00565E1C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 2_2_0056F61C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 2_2_0056EEB8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW, | 2_2_0056F723 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 2_2_0056F7F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoA, | 2_2_0052E2BB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 6_2_0044F17B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 6_2_0044F130 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 6_2_0044F216 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 6_2_0044F2A3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoA, | 6_2_0040E2BB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW, | 6_2_0044F4F3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 6_2_0044F61C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW, | 6_2_0044F723 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 6_2_0044F7F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: EnumSystemLocalesW, | 6_2_00445914 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: GetLocaleInfoW, | 6_2_00445E1C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 6_2_0044EEB8 |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000006.00000002.1562100020.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1575370047.0000000003B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.3880640441.000000000068A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: payment receipt copy.bat.exe PID: 7560, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 7660, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ShouldExitCurrentIteration.exe PID: 7920, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 8012, type: MEMORYSTR |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payment receipt copy.bat.exe.3d86138.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000006.00000002.1562100020.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1575370047.0000000003B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.3880640441.000000000068A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1433294002.0000000003E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1561526325.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: payment receipt copy.bat.exe PID: 7560, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 7660, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ShouldExitCurrentIteration.exe PID: 7920, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: InstallUtil.exe PID: 8012, type: MEMORYSTR |