Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D35908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, |
0_2_02D35908 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0292B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
6_2_0292B335 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0293B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
6_2_0293B42F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0296D5E9 FindFirstFileExA, |
6_2_0296D5E9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0292B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
6_2_0292B53A |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02927A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
6_2_02927A8C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02926AC2 FindFirstFileW,FindNextFileW, |
6_2_02926AC2 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_029289A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
6_2_029289A9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02938C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
6_2_02938C69 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02928DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
6_2_02928DA7 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E40207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove, |
9_2_00E40207 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E4589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose, |
9_2_00E4589A |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E44EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW, |
9_2_00E44EC1 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E53E66 FindFirstFileW,FindNextFileW,FindClose, |
9_2_00E53E66 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E3532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose, |
9_2_00E3532E |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E4589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose, |
11_2_00E4589A |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E40207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove, |
11_2_00E40207 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E44EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW, |
11_2_00E44EC1 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E53E66 FindFirstFileW,FindNextFileW,FindClose, |
11_2_00E53E66 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E3532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose, |
11_2_00E3532E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0294B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
19_2_0294B335 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0295B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
19_2_0295B42F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0298D5E9 FindFirstFileExA, |
19_2_0298D5E9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0294B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
19_2_0294B53A |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02947A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
19_2_02947A8C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02946AC2 FindFirstFileW,FindNextFileW, |
19_2_02946AC2 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_029489A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
19_2_029489A9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02958C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
19_2_02958C69 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02948DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
19_2_02948DA7 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0# |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: SndVol.exe |
String found in binary or memory: http://geoplugin.net/json.gp |
Source: jW3NEKvxH1.exe, 00000000.00000002.2268573448.0000000002DB7000.00000040.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2288933657.000000007E7A0000.00000004.00001000.00020000.00000000.sdmp, SndVol.exe, 00000006.00000002.4603814181.0000000002920000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 00000013.00000002.2410456379.0000000002940000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000018.00000002.2475144100.0000000002460000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.comodoca.com0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0A |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0C |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0X |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.sectigo.com0 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.sectigo.com0C |
Source: jW3NEKvxH1.exe, jW3NEKvxH1.exe, 00000000.00000002.2268329674.0000000002D5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2145952303.0000000002856000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2293566287.000000007FAB0000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2266672340.0000000002854000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2146235666.000000007F96F000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://www.pmail.com |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/03fa479d-619a-4b32-874d-a4ddf918e902/downloads/2601acd3-63c3- |
Source: jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443/03fa479d-619a-4b32-874d-a4ddf918e902/downloads/2601acd3-6 |
Source: jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000819000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bitbucket.org/ |
Source: jW3NEKvxH1.exe, 00000000.00000002.2280895111.0000000020B1D000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: https://bitbucket.org/masterservicwes/ma |
Source: jW3NEKvxH1.exe, 00000000.00000002.2265349899.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bitbucket.org/masterservicwes/mastermanservices/downloads/165_Dlaybpxloke |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.cookielaw.org/ |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000002.2265349899.0000000000823000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: jW3NEKvxH1.exe, 00000000.00000002.2290920143.000000007EE5E000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2228181025.000000007F040000.00000004.00001000.00020000.00000000.sdmp, jW3NEKvxH1.exe, 00000000.00000003.2227877290.000000007EA50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: https://sectigo.com/CPS0 |
Source: jW3NEKvxH1.exe, 00000000.00000003.2249773690.000000000086A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: 19.2.SndVol.exe.2940000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 19.2.SndVol.exe.2940000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 19.2.SndVol.exe.2940000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 24.2.colorcpl.exe.2460000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 24.2.colorcpl.exe.2460000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 24.2.colorcpl.exe.2460000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 24.2.colorcpl.exe.2460000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 24.2.colorcpl.exe.2460000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 24.2.colorcpl.exe.2460000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.SndVol.exe.2920000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.SndVol.exe.2920000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.SndVol.exe.2920000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.SndVol.exe.2920000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.SndVol.exe.2920000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.SndVol.exe.2920000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 19.2.SndVol.exe.2940000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 19.2.SndVol.exe.2940000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 19.2.SndVol.exe.2940000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.jW3NEKvxH1.exe.2d30000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.jW3NEKvxH1.exe.2d30000.2.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000006.00000002.4603814181.0000000002920000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000006.00000002.4603814181.0000000002920000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000006.00000002.4603814181.0000000002920000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000000.00000002.2268573448.0000000002DB7000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000018.00000002.2475144100.0000000002460000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000018.00000002.2475144100.0000000002460000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000018.00000002.2475144100.0000000002460000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000013.00000002.2410456379.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000013.00000002.2410456379.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000013.00000002.2410456379.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000000.00000002.2288933657.000000007E7A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: jW3NEKvxH1.exe PID: 616, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: SndVol.exe PID: 4576, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: SndVol.exe PID: 3648, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: colorcpl.exe PID: 2680, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D48730 NtQueueApcThread, |
0_2_02D48730 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D47A2C NtAllocateVirtualMemory, |
0_2_02D47A2C |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D4DC8C RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, |
0_2_02D4DC8C |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D4DC04 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
0_2_02D4DC04 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D4DD70 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, |
0_2_02D4DD70 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D47D78 NtWriteVirtualMemory, |
0_2_02D47D78 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D48D70 GetThreadContext,SetThreadContext,NtResumeThread, |
0_2_02D48D70 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D48D6E GetThreadContext,SetThreadContext,NtResumeThread, |
0_2_02D48D6E |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D47A2A NtAllocateVirtualMemory, |
0_2_02D47A2A |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D4DBB0 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
0_2_02D4DBB0 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E464CA NtQueryInformationToken, |
9_2_00E464CA |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E57460 EnterCriticalSection,LeaveCriticalSection,fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer, |
9_2_00E57460 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E44823 NtQueryVolumeInformationFile,GetFileInformationByHandleEx, |
9_2_00E44823 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E4643A NtOpenThreadToken,NtOpenProcessToken,NtClose, |
9_2_00E4643A |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E5C1FA SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memcpy,memcpy,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW, |
9_2_00E5C1FA |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E5A135 NtSetInformationFile, |
9_2_00E5A135 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E46500 NtQueryInformationToken,NtQueryInformationToken, |
9_2_00E46500 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E34E3B _setjmp3,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,longjmp, |
9_2_00E34E3B |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E44759 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,DeleteFileW,GetLastError, |
9_2_00E44759 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E464CA NtQueryInformationToken, |
11_2_00E464CA |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E57460 EnterCriticalSection,LeaveCriticalSection,fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer, |
11_2_00E57460 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E44823 NtQueryVolumeInformationFile,GetFileInformationByHandleEx, |
11_2_00E44823 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E4643A NtOpenThreadToken,NtOpenProcessToken,NtClose, |
11_2_00E4643A |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E5C1FA SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memcpy,memcpy,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW, |
11_2_00E5C1FA |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E5A135 NtSetInformationFile, |
11_2_00E5A135 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E46500 NtQueryInformationToken,NtQueryInformationToken, |
11_2_00E46500 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E34E3B _setjmp3,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,longjmp, |
11_2_00E34E3B |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E44759 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,DeleteFileW,GetLastError, |
11_2_00E44759 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E38730 NtQueueApcThread, |
15_2_02E38730 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E37A2C NtAllocateVirtualMemory, |
15_2_02E37A2C |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E3DD70 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose, |
15_2_02E3DD70 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E37D78 NtWriteVirtualMemory, |
15_2_02E37D78 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E37AC9 NtAllocateVirtualMemory, |
15_2_02E37AC9 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E37A2A NtAllocateVirtualMemory, |
15_2_02E37A2A |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E3DBB0 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
15_2_02E3DBB0 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E3DC8C RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, |
15_2_02E3DC8C |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E3DC04 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
15_2_02E3DC04 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E38D6E GetThreadContext,SetThreadContext,NtResumeThread, |
15_2_02E38D6E |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E38D70 GetThreadContext,SetThreadContext,NtResumeThread, |
15_2_02E38D70 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DF43CB |
0_2_02DF43CB |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DF83B0 |
0_2_02DF83B0 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D320C4 |
0_2_02D320C4 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DF419C |
0_2_02DF419C |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DEE6E0 |
0_2_02DEE6E0 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DD4601 |
0_2_02DD4601 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DF4628 |
0_2_02DF4628 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DCA4D5 |
0_2_02DCA4D5 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02E0A490 |
0_2_02E0A490 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DDE403 |
0_2_02DDE403 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DDE53D |
0_2_02DDE53D |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D3C9DF |
0_2_02D3C9DF |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D3C98F |
0_2_02D3C98F |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DE8907 |
0_2_02DE8907 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02E09662 |
0_2_02E09662 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DDD7E4 |
0_2_02DDD7E4 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DED73A |
0_2_02DED73A |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DD5B6F |
0_2_02DD5B6F |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DE9FD9 |
0_2_02DE9FD9 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DF3F6D |
0_2_02DF3F6D |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02E03CC9 |
0_2_02E03CC9 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D8BCF4 |
0_2_02D8BCF4 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02DDDD5B |
0_2_02DDDD5B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02946254 |
6_2_02946254 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02951377 |
6_2_02951377 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0295D098 |
6_2_0295D098 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_029720D2 |
6_2_029720D2 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0293D071 |
6_2_0293D071 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_029561AA |
6_2_029561AA |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02957150 |
6_2_02957150 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_029467CB |
6_2_029467CB |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0296C739 |
6_2_0296C739 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0293E5DF |
6_2_0293E5DF |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02952A49 |
6_2_02952A49 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0295C9DD |
6_2_0295C9DD |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0295CE3B |
6_2_0295CE3B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02960E20 |
6_2_02960E20 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02946E73 |
6_2_02946E73 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02946FAD |
6_2_02946FAD |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02972F00 |
6_2_02972F00 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02932F45 |
6_2_02932F45 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0295CC0C |
6_2_0295CC0C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02954D22 |
6_2_02954D22 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E374B1 |
9_2_00E374B1 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E44875 |
9_2_00E44875 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E3540A |
9_2_00E3540A |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E34C10 |
9_2_00E34C10 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E54191 |
9_2_00E54191 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E39144 |
9_2_00E39144 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E5695A |
9_2_00E5695A |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E44EC1 |
9_2_00E44EC1 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E43EB3 |
9_2_00E43EB3 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E45A86 |
9_2_00E45A86 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E5769E |
9_2_00E5769E |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E53E66 |
9_2_00E53E66 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E3D660 |
9_2_00E3D660 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E36E57 |
9_2_00E36E57 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E37A34 |
9_2_00E37A34 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E3EE03 |
9_2_00E3EE03 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E40BF0 |
9_2_00E40BF0 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E40740 |
9_2_00E40740 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E36B20 |
9_2_00E36B20 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E374B1 |
11_2_00E374B1 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E44875 |
11_2_00E44875 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E3540A |
11_2_00E3540A |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E34C10 |
11_2_00E34C10 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E54191 |
11_2_00E54191 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E39144 |
11_2_00E39144 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E5695A |
11_2_00E5695A |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E44EC1 |
11_2_00E44EC1 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E43EB3 |
11_2_00E43EB3 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E45A86 |
11_2_00E45A86 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E5769E |
11_2_00E5769E |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E53E66 |
11_2_00E53E66 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E3D660 |
11_2_00E3D660 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E36E57 |
11_2_00E36E57 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E37A34 |
11_2_00E37A34 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E3EE03 |
11_2_00E3EE03 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E40BF0 |
11_2_00E40BF0 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E40740 |
11_2_00E40740 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E36B20 |
11_2_00E36B20 |
Source: C:\Users\Public\xpha.pif |
Code function: 12_2_00841E26 |
12_2_00841E26 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: 15_2_02E220C4 |
15_2_02E220C4 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02966254 |
19_2_02966254 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02971377 |
19_2_02971377 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0297D098 |
19_2_0297D098 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_029920D2 |
19_2_029920D2 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0295D071 |
19_2_0295D071 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_029761AA |
19_2_029761AA |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02977150 |
19_2_02977150 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_029667CB |
19_2_029667CB |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0298C739 |
19_2_0298C739 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0295E5DF |
19_2_0295E5DF |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02972A49 |
19_2_02972A49 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0297C9DD |
19_2_0297C9DD |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0297CE3B |
19_2_0297CE3B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02980E20 |
19_2_02980E20 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02966E73 |
19_2_02966E73 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02966FAD |
19_2_02966FAD |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02992F00 |
19_2_02992F00 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02952F45 |
19_2_02952F45 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0297CC0C |
19_2_0297CC0C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02974D22 |
19_2_02974D22 |
Source: 19.2.SndVol.exe.2940000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 19.2.SndVol.exe.2940000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 19.2.SndVol.exe.2940000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 24.2.colorcpl.exe.2460000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 24.2.colorcpl.exe.2460000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 24.2.colorcpl.exe.2460000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 24.2.colorcpl.exe.2460000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 24.2.colorcpl.exe.2460000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 24.2.colorcpl.exe.2460000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.SndVol.exe.2920000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.SndVol.exe.2920000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.SndVol.exe.2920000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.SndVol.exe.2920000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.SndVol.exe.2920000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.SndVol.exe.2920000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 19.2.SndVol.exe.2940000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 19.2.SndVol.exe.2940000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 19.2.SndVol.exe.2940000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.jW3NEKvxH1.exe.2d30000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.jW3NEKvxH1.exe.2d30000.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000006.00000002.4603814181.0000000002920000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000006.00000002.4603814181.0000000002920000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000006.00000002.4603814181.0000000002920000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.2268573448.0000000002DB7000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000018.00000002.2475144100.0000000002460000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000018.00000002.2475144100.0000000002460000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000018.00000002.2475144100.0000000002460000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000013.00000002.2410456379.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000013.00000002.2410456379.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000013.00000002.2410456379.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.2288933657.000000007E7A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: jW3NEKvxH1.exe PID: 616, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: SndVol.exe PID: 4576, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: SndVol.exe PID: 3648, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 2680, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: unknown |
Process created: C:\Users\user\Desktop\jW3NEKvxH1.exe "C:\Users\user\Desktop\jW3NEKvxH1.exe" |
|
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxpbyalD.cmd" " |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o |
|
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\jW3NEKvxH1.exe /d C:\\Users\\Public\\Libraries\\Dlaybpxl.PIF /o |
|
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe |
|
Source: C:\Windows\SysWOW64\esentutl.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\xpha.pif C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10 |
|
Source: unknown |
Process created: C:\Users\Public\Libraries\Dlaybpxl.PIF "C:\Users\Public\Libraries\Dlaybpxl.PIF" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64 |
|
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \" |
|
Source: unknown |
Process created: C:\Users\Public\Libraries\Dlaybpxl.PIF "C:\Users\Public\Libraries\Dlaybpxl.PIF" |
|
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe |
|
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxpbyalD.cmd" " |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\jW3NEKvxH1.exe /d C:\\Users\\Public\\Libraries\\Dlaybpxl.PIF /o |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \" |
Jump to behavior |
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\xpha.pif C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe |
Jump to behavior |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe |
|
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??????p??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: 0_2_02D35908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, |
0_2_02D35908 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0292B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
6_2_0292B335 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0293B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
6_2_0293B42F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0296D5E9 FindFirstFileExA, |
6_2_0296D5E9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_0292B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
6_2_0292B53A |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02927A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
6_2_02927A8C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02926AC2 FindFirstFileW,FindNextFileW, |
6_2_02926AC2 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_029289A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
6_2_029289A9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02938C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
6_2_02938C69 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 6_2_02928DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
6_2_02928DA7 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E40207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove, |
9_2_00E40207 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E4589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose, |
9_2_00E4589A |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E44EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW, |
9_2_00E44EC1 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E53E66 FindFirstFileW,FindNextFileW,FindClose, |
9_2_00E53E66 |
Source: C:\Users\Public\alpha.pif |
Code function: 9_2_00E3532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose, |
9_2_00E3532E |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E4589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose, |
11_2_00E4589A |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E40207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove, |
11_2_00E40207 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E44EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW, |
11_2_00E44EC1 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E53E66 FindFirstFileW,FindNextFileW,FindClose, |
11_2_00E53E66 |
Source: C:\Users\Public\alpha.pif |
Code function: 11_2_00E3532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose, |
11_2_00E3532E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0294B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
19_2_0294B335 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0295B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
19_2_0295B42F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0298D5E9 FindFirstFileExA, |
19_2_0298D5E9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_0294B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
19_2_0294B53A |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02947A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
19_2_02947A8C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02946AC2 FindFirstFileW,FindNextFileW, |
19_2_02946AC2 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_029489A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
19_2_029489A9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02958C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
19_2_02958C69 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 19_2_02948DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
19_2_02948DA7 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, |
0_2_02D35ACC |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: GetLocaleInfoA, |
0_2_02D3A7C4 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: GetLocaleInfoA, |
0_2_02D3A810 |
Source: C:\Users\user\Desktop\jW3NEKvxH1.exe |
Code function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, |
0_2_02D35BD8 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
6_2_029712EA |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
6_2_029713B7 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
6_2_029710BA |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
6_2_029670AE |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
6_2_029711E3 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoA, |
6_2_0292E679 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
6_2_02967597 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
6_2_02970A7F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
6_2_02970E6A |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
6_2_02970CF7 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
6_2_02970DDD |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
6_2_02970D42 |
Source: C:\Users\Public\alpha.pif |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale, |
9_2_00E38572 |
Source: C:\Users\Public\alpha.pif |
Code function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,GetDateFormatW,memmove,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,GetLastError,realloc, |
9_2_00E36854 |
Source: C:\Users\Public\alpha.pif |
Code function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW, |
9_2_00E39310 |
Source: C:\Users\Public\alpha.pif |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale, |
11_2_00E38572 |
Source: C:\Users\Public\alpha.pif |
Code function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,GetDateFormatW,memmove,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,GetLastError,realloc, |
11_2_00E36854 |
Source: C:\Users\Public\alpha.pif |
Code function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW, |
11_2_00E39310 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, |
15_2_02E25ACC |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, |
15_2_02E25BD7 |
Source: C:\Users\Public\Libraries\Dlaybpxl.PIF |
Code function: GetLocaleInfoA, |
15_2_02E2A810 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
19_2_029912EA |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
19_2_029913B7 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
19_2_029910BA |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
19_2_029870AE |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
19_2_029911E3 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoA, |
19_2_0294E679 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
19_2_02987597 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
19_2_02990A7F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
19_2_02990E6A |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
19_2_02990CF7 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
19_2_02990DDD |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
19_2_02990D42 |