Source: | Binary string: wntdll.pdbUGP source: tabulations.exe, 00000001.00000003.1738382184.0000000003440000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000001.00000003.1738072642.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1895770742.0000000003700000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1896382586.00000000038A0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: tabulations.exe, 00000001.00000003.1738382184.0000000003440000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000001.00000003.1738072642.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1895770742.0000000003700000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1896382586.00000000038A0000.00000004.00001000.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006F445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_006F445A |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006FC6D1 FindFirstFileW,FindClose, | 0_2_006FC6D1 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006FC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_006FC75C |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006FEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_006FEF95 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006FF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_006FF0F2 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006FF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_006FF3F3 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006F37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_006F37EF |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006F3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_006F3B12 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006FBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_006FBCBC |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0096445A GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_0096445A |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0096C6D1 FindFirstFileW,FindClose, | 1_2_0096C6D1 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0096C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 1_2_0096C75C |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0096EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0096EF95 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0096F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0096F0F2 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0096F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_0096F3F3 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_009637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_009637EF |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00963B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_00963B12 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0096BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_0096BCBC |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: unknown | TCP traffic detected without corresponding DNS query: 69.174.100.131 |
Source: RegSvcs.exe, 00000002.00000002.2925168197.0000000000C38000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: 77EC63BDA74BD0D0E0426DC8F80085060.2.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: RegSvcs.exe, 00000002.00000002.2925168197.0000000000C38000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabaoqv |
Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Yara match | File source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: tabulations.exe PID: 6996, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 7140, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: tabulations.exe PID: 3068, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTR |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_00704164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, | 0_2_00704164 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00974164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, | 1_2_00974164 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_00703F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, | 0_2_00703F66 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_0071CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_0071CABC |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0098CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 1_2_0098CABC |
Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: This is a third-party compiled AutoIt script. | 0_2_00693B3A |
Source: bcUcEm7AqP.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: bcUcEm7AqP.exe, 00000000.00000003.1698932938.0000000003A73000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_ad48a708-8 |
Source: bcUcEm7AqP.exe, 00000000.00000003.1698932938.0000000003A73000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_ba22807c-c |
Source: bcUcEm7AqP.exe, 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_18fc3f46-3 |
Source: bcUcEm7AqP.exe, 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_0499197b-9 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: This is a third-party compiled AutoIt script. | 1_2_00903B3A |
Source: tabulations.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: tabulations.exe, 00000001.00000002.1740625539.00000000009B4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_8741f5e3-b |
Source: tabulations.exe, 00000001.00000002.1740625539.00000000009B4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_b9718ba1-1 |
Source: tabulations.exe, 00000005.00000000.1858251439.00000000009B4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_60cfbd33-f |
Source: tabulations.exe, 00000005.00000000.1858251439.00000000009B4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_5cd51291-9 |
Source: bcUcEm7AqP.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_b7c9c52c-0 |
Source: bcUcEm7AqP.exe | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_e05fc0b6-3 |
Source: tabulations.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_e9a230b7-5 |
Source: tabulations.exe.0.dr | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_4a683627-2 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006E8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, | 0_2_006E8310 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_0069E6A0 | 0_2_0069E6A0 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006BD975 | 0_2_006BD975 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_0069FCE0 | 0_2_0069FCE0 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006B21C5 | 0_2_006B21C5 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006C62D2 | 0_2_006C62D2 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_007103DA | 0_2_007103DA |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006C242E | 0_2_006C242E |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006B25FA | 0_2_006B25FA |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006EE616 | 0_2_006EE616 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006A66E1 | 0_2_006A66E1 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006C878F | 0_2_006C878F |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_00710857 | 0_2_00710857 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006C6844 | 0_2_006C6844 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006A8808 | 0_2_006A8808 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006F8889 | 0_2_006F8889 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006BCB21 | 0_2_006BCB21 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006C6DB6 | 0_2_006C6DB6 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006A6F9E | 0_2_006A6F9E |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006A3030 | 0_2_006A3030 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006BF1D9 | 0_2_006BF1D9 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006B3187 | 0_2_006B3187 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_00691287 | 0_2_00691287 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006B1484 | 0_2_006B1484 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006A5520 | 0_2_006A5520 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006B7696 | 0_2_006B7696 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006A5760 | 0_2_006A5760 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006B1978 | 0_2_006B1978 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006C9AB5 | 0_2_006C9AB5 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_00717DDB | 0_2_00717DDB |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006BBDA6 | 0_2_006BBDA6 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006B1D90 | 0_2_006B1D90 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_0069DF00 | 0_2_0069DF00 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_006A3FE0 | 0_2_006A3FE0 |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: 0_2_010450E0 | 0_2_010450E0 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0090E6A0 | 1_2_0090E6A0 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0092D975 | 1_2_0092D975 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0090FCE0 | 1_2_0090FCE0 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_009221C5 | 1_2_009221C5 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_009362D2 | 1_2_009362D2 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_009803DA | 1_2_009803DA |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0093242E | 1_2_0093242E |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_009225FA | 1_2_009225FA |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_009166E1 | 1_2_009166E1 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0095E616 | 1_2_0095E616 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0093878F | 1_2_0093878F |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00968889 | 1_2_00968889 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00918808 | 1_2_00918808 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00980857 | 1_2_00980857 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00936844 | 1_2_00936844 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0092CB21 | 1_2_0092CB21 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00936DB6 | 1_2_00936DB6 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00916F9E | 1_2_00916F9E |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00913030 | 1_2_00913030 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00923187 | 1_2_00923187 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0092F1D9 | 1_2_0092F1D9 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00901287 | 1_2_00901287 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00921484 | 1_2_00921484 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00915520 | 1_2_00915520 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00927696 | 1_2_00927696 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00915760 | 1_2_00915760 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00921978 | 1_2_00921978 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00939AB5 | 1_2_00939AB5 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00921D90 | 1_2_00921D90 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0092BDA6 | 1_2_0092BDA6 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00987DDB | 1_2_00987DDB |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00913FE0 | 1_2_00913FE0 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_0090DF00 | 1_2_0090DF00 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 1_2_00B98AE0 | 1_2_00B98AE0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028665C0 | 2_2_028665C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_02865CF0 | 2_2_02865CF0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_0286A878 | 2_2_0286A878 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028659A8 | 2_2_028659A8 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: 5_2_01006EF0 | 5_2_01006EF0 |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: String function: 00920AE3 appears 70 times | |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: String function: 00907DE1 appears 35 times | |
Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe | Code function: String function: 00928900 appears 42 times | |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: String function: 006B0AE3 appears 70 times | |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: String function: 00697DE1 appears 36 times | |
Source: C:\Users\user\Desktop\bcUcEm7AqP.exe | Code function: String function: 006B8900 appears 42 times | |
Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |