Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DE445A GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_00DE445A |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEC6D1 FindFirstFileW,FindClose, |
0_2_00DEC6D1 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_00DEC75C |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00DEEF95 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00DEF0F2 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_00DEF3F3 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DE37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_00DE37EF |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DE3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_00DE3B12 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_00DEBCBC |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
2_2_0040B335 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
2_2_0041B42F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
2_2_0040B53A |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0044D5E9 FindFirstFileExA, |
2_2_0044D5E9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
2_2_004089A9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00406AC2 FindFirstFileW,FindNextFileW, |
2_2_00406AC2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
2_2_00407A8C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
2_2_00418C69 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
2_2_00408DA7 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2445A GetFileAttributesW,FindFirstFileW,FindClose, |
2_2_00E2445A |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2C6D1 FindFirstFileW,FindClose, |
2_2_00E2C6D1 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
2_2_00E2C75C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
2_2_00E2EF95 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
2_2_00E2F0F2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
2_2_00E2F3F3 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E237EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
2_2_00E237EF |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E23B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
2_2_00E23B12 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
2_2_00E2BCBC |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
5_2_0040B335 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
5_2_0041B42F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
5_2_0040B53A |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0044D5E9 FindFirstFileExA, |
5_2_0044D5E9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
5_2_004089A9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00406AC2 FindFirstFileW,FindNextFileW, |
5_2_00406AC2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
5_2_00407A8C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
5_2_00418C69 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
5_2_00408DA7 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49706 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49705 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49707 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49709 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49708 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49712 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49714 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49716 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49718 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49720 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49728 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49717 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49726 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49719 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49723 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49729 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49721 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49730 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49725 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49734 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49738 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49732 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49733 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49731 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49742 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49739 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49744 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49750 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49746 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49766 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49749 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49748 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49753 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49745 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49755 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49769 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49754 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49743 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49778 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49788 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49786 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49757 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49770 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49782 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49773 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49765 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49783 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49764 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49790 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49774 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49775 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49768 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49758 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49771 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49784 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49792 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49741 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49781 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49795 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49752 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49777 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49789 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49800 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49763 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49760 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49756 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49794 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49767 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49772 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49793 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49762 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49759 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49787 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49779 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49722 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49799 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49780 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49797 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49736 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49761 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49798 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49785 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49776 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49796 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49715 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49747 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49740 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49751 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49791 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49801 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49724 -> 192.210.150.26:8787 |
Source: 4.2.nonhazardousness.exe.2f00000.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.nonhazardousness.exe.2f00000.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.nonhazardousness.exe.2f00000.1.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.nonhazardousness.exe.38f0000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.nonhazardousness.exe.38f0000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.nonhazardousness.exe.38f0000.2.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.nonhazardousness.exe.3470000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.nonhazardousness.exe.3470000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.nonhazardousness.exe.3470000.2.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.nonhazardousness.exe.38f0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.nonhazardousness.exe.38f0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.nonhazardousness.exe.38f0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.nonhazardousness.exe.3470000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.nonhazardousness.exe.3470000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.nonhazardousness.exe.3470000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 4.2.nonhazardousness.exe.2f00000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.nonhazardousness.exe.2f00000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.nonhazardousness.exe.2f00000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.3878085476.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.3878085476.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.3878085476.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.3878890270.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.3878890270.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.3878890270.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000004.00000002.1566559449.0000000002F00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000004.00000002.1566559449.0000000002F00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000004.00000002.1566559449.0000000002F00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000005.00000002.1572582993.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.1572582993.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000005.00000002.1572582993.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000005.00000002.1573670320.0000000003470000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.1573670320.0000000003470000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000005.00000002.1573670320.0000000003470000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: nonhazardousness.exe PID: 6052, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: nonhazardousness.exe PID: 2352, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: nonhazardousness.exe PID: 2772, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D83633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, |
0_2_00D83633 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C1AC PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W, |
0_2_00E0C1AC |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C498 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, |
0_2_00E0C498 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C5FE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, |
0_2_00E0C5FE |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C57D SendMessageW,NtdllDialogWndProc_W, |
0_2_00E0C57D |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C8BE NtdllDialogWndProc_W, |
0_2_00E0C8BE |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C88F NtdllDialogWndProc_W, |
0_2_00E0C88F |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C860 NtdllDialogWndProc_W, |
0_2_00E0C860 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C93E ClientToScreen,NtdllDialogWndProc_W, |
0_2_00E0C93E |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0C909 NtdllDialogWndProc_W, |
0_2_00E0C909 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
0_2_00E0CABC |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0CA7C GetWindowLongW,NtdllDialogWndProc_W, |
0_2_00E0CA7C |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D81290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient, |
0_2_00D81290 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D81287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,7524C8D0,NtdllDialogWndProc_W, |
0_2_00D81287 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0D3B8 NtdllDialogWndProc_W, |
0_2_00E0D3B8 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0D43E GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, |
0_2_00E0D43E |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D816DE GetParent,NtdllDialogWndProc_W, |
0_2_00D816DE |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D816B5 NtdllDialogWndProc_W, |
0_2_00D816B5 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D8167D NtdllDialogWndProc_W, |
0_2_00D8167D |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0D78C NtdllDialogWndProc_W, |
0_2_00E0D78C |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D8189B NtdllDialogWndProc_W, |
0_2_00D8189B |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0BC5D NtdllDialogWndProc_W,CallWindowProcW, |
0_2_00E0BC5D |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0BF8C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, |
0_2_00E0BF8C |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E0BF30 NtdllDialogWndProc_W, |
0_2_00E0BF30 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, |
2_2_0041CA9E |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle, |
2_2_0041ACC1 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle, |
2_2_0041ACED |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC3633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, |
2_2_00DC3633 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C1AC PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W, |
2_2_00E4C1AC |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C498 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, |
2_2_00E4C498 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C5FE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, |
2_2_00E4C5FE |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C57D SendMessageW,NtdllDialogWndProc_W, |
2_2_00E4C57D |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C8BE NtdllDialogWndProc_W, |
2_2_00E4C8BE |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C88F NtdllDialogWndProc_W, |
2_2_00E4C88F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C860 NtdllDialogWndProc_W, |
2_2_00E4C860 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C93E ClientToScreen,NtdllDialogWndProc_W, |
2_2_00E4C93E |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4C909 NtdllDialogWndProc_W, |
2_2_00E4C909 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
2_2_00E4CABC |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4CA7C GetWindowLongW,NtdllDialogWndProc_W, |
2_2_00E4CA7C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC1290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient, |
2_2_00DC1290 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC1287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,7524C8D0,NtdllDialogWndProc_W, |
2_2_00DC1287 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4D3B8 NtdllDialogWndProc_W, |
2_2_00E4D3B8 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4D43E GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, |
2_2_00E4D43E |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC16DE GetParent,NtdllDialogWndProc_W, |
2_2_00DC16DE |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC16B5 NtdllDialogWndProc_W, |
2_2_00DC16B5 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC167D NtdllDialogWndProc_W, |
2_2_00DC167D |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4D78C NtdllDialogWndProc_W, |
2_2_00E4D78C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC189B NtdllDialogWndProc_W, |
2_2_00DC189B |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4BC5D NtdllDialogWndProc_W,CallWindowProcW, |
2_2_00E4BC5D |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4BF8C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, |
2_2_00E4BF8C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E4BF30 NtdllDialogWndProc_W, |
2_2_00E4BF30 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, |
5_2_0041CA9E |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle, |
5_2_0041ACC1 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle, |
5_2_0041ACED |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DAD975 |
0_2_00DAD975 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D8FCE0 |
0_2_00D8FCE0 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DA21C5 |
0_2_00DA21C5 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DB62D2 |
0_2_00DB62D2 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E003DA |
0_2_00E003DA |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DB242E |
0_2_00DB242E |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DA25FA |
0_2_00DA25FA |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D966E1 |
0_2_00D966E1 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D8E6A0 |
0_2_00D8E6A0 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DDE616 |
0_2_00DDE616 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DB878F |
0_2_00DB878F |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DE8889 |
0_2_00DE8889 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DB6844 |
0_2_00DB6844 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E00857 |
0_2_00E00857 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D98808 |
0_2_00D98808 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DACB21 |
0_2_00DACB21 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DB6DB6 |
0_2_00DB6DB6 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D96F9E |
0_2_00D96F9E |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D93030 |
0_2_00D93030 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DAF1D9 |
0_2_00DAF1D9 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DA3187 |
0_2_00DA3187 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D81287 |
0_2_00D81287 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DA1484 |
0_2_00DA1484 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D95520 |
0_2_00D95520 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DA7696 |
0_2_00DA7696 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D95760 |
0_2_00D95760 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DA1978 |
0_2_00DA1978 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DB9AB5 |
0_2_00DB9AB5 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00E07DDB |
0_2_00E07DDB |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DA1D90 |
0_2_00DA1D90 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DABDA6 |
0_2_00DABDA6 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D93FE0 |
0_2_00D93FE0 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00D8DF00 |
0_2_00D8DF00 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_01064FB8 |
0_2_01064FB8 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0041D071 |
2_2_0041D071 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_004520D2 |
2_2_004520D2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0043D098 |
2_2_0043D098 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00437150 |
2_2_00437150 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_004361AA |
2_2_004361AA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00426254 |
2_2_00426254 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00431377 |
2_2_00431377 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0043651C |
2_2_0043651C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0041E5DF |
2_2_0041E5DF |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0044C739 |
2_2_0044C739 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_004367C6 |
2_2_004367C6 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_004267CB |
2_2_004267CB |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0043C9DD |
2_2_0043C9DD |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00432A49 |
2_2_00432A49 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00436A8D |
2_2_00436A8D |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0043CC0C |
2_2_0043CC0C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00436D48 |
2_2_00436D48 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00434D22 |
2_2_00434D22 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00426E73 |
2_2_00426E73 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00440E20 |
2_2_00440E20 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0043CE3B |
2_2_0043CE3B |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00412F45 |
2_2_00412F45 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00452F00 |
2_2_00452F00 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00426FAD |
2_2_00426FAD |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DED975 |
2_2_00DED975 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DCFCE0 |
2_2_00DCFCE0 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DE21C5 |
2_2_00DE21C5 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DF62D2 |
2_2_00DF62D2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E403DA |
2_2_00E403DA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DF242E |
2_2_00DF242E |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DE25FA |
2_2_00DE25FA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DD66E1 |
2_2_00DD66E1 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DCE6A0 |
2_2_00DCE6A0 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E1E616 |
2_2_00E1E616 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DF878F |
2_2_00DF878F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E28889 |
2_2_00E28889 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DF6844 |
2_2_00DF6844 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E40857 |
2_2_00E40857 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DD8808 |
2_2_00DD8808 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DECB21 |
2_2_00DECB21 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DF6DB6 |
2_2_00DF6DB6 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DD6F9E |
2_2_00DD6F9E |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DD3030 |
2_2_00DD3030 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DEF1D9 |
2_2_00DEF1D9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DE3187 |
2_2_00DE3187 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DC1287 |
2_2_00DC1287 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DE1484 |
2_2_00DE1484 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DD5520 |
2_2_00DD5520 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DE7696 |
2_2_00DE7696 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DD5760 |
2_2_00DD5760 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DE1978 |
2_2_00DE1978 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DF9AB5 |
2_2_00DF9AB5 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E47DDB |
2_2_00E47DDB |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DE1D90 |
2_2_00DE1D90 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DEBDA6 |
2_2_00DEBDA6 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DD3FE0 |
2_2_00DD3FE0 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00DCDF00 |
2_2_00DCDF00 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_01802228 |
2_2_01802228 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 4_2_01041AB0 |
4_2_01041AB0 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0041D071 |
5_2_0041D071 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_004520D2 |
5_2_004520D2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0043D098 |
5_2_0043D098 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00437150 |
5_2_00437150 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_004361AA |
5_2_004361AA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00426254 |
5_2_00426254 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00431377 |
5_2_00431377 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0043651C |
5_2_0043651C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0041E5DF |
5_2_0041E5DF |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0044C739 |
5_2_0044C739 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_004367C6 |
5_2_004367C6 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_004267CB |
5_2_004267CB |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0043C9DD |
5_2_0043C9DD |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00432A49 |
5_2_00432A49 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00436A8D |
5_2_00436A8D |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0043CC0C |
5_2_0043CC0C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00436D48 |
5_2_00436D48 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00434D22 |
5_2_00434D22 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00426E73 |
5_2_00426E73 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00440E20 |
5_2_00440E20 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0043CE3B |
5_2_0043CE3B |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00412F45 |
5_2_00412F45 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00452F00 |
5_2_00452F00 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00426FAD |
5_2_00426FAD |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_01454938 |
5_2_01454938 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: String function: 00D87DE1 appears 35 times |
|
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: String function: 00DA0AE3 appears 70 times |
|
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: String function: 00DA8900 appears 42 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00444B14 appears 56 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00404C9E appears 32 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 004020E7 appears 79 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00DE0AE3 appears 70 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00DC7DE1 appears 35 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00401E8F appears 37 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00401D64 appears 43 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00447174 appears 36 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 004040BB appears 36 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00401F66 appears 100 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00410D8D appears 36 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 004338A5 appears 82 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00401FAA appears 42 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00403B40 appears 44 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00DE8900 appears 42 times |
|
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: String function: 00433FB0 appears 110 times |
|
Source: 4.2.nonhazardousness.exe.2f00000.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.nonhazardousness.exe.2f00000.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.nonhazardousness.exe.2f00000.1.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.nonhazardousness.exe.38f0000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.nonhazardousness.exe.38f0000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.nonhazardousness.exe.38f0000.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.nonhazardousness.exe.3470000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.nonhazardousness.exe.3470000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.nonhazardousness.exe.3470000.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.nonhazardousness.exe.38f0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.nonhazardousness.exe.38f0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.nonhazardousness.exe.38f0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.nonhazardousness.exe.3470000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.nonhazardousness.exe.3470000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.nonhazardousness.exe.3470000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.nonhazardousness.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.nonhazardousness.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 4.2.nonhazardousness.exe.2f00000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.nonhazardousness.exe.2f00000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.nonhazardousness.exe.2f00000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.3878085476.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.3878085476.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.3878085476.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.3878890270.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.3878890270.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.3878890270.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000004.00000002.1566559449.0000000002F00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000004.00000002.1566559449.0000000002F00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000004.00000002.1566559449.0000000002F00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000005.00000002.1572582993.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.1572582993.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000005.00000002.1572582993.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000005.00000002.1573670320.0000000003470000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.1573670320.0000000003470000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000005.00000002.1573670320.0000000003470000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: nonhazardousness.exe PID: 6052, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: nonhazardousness.exe PID: 2352, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: nonhazardousness.exe PID: 2772, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: vbscript.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: mlang.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DE445A GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_00DE445A |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEC6D1 FindFirstFileW,FindClose, |
0_2_00DEC6D1 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_00DEC75C |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00DEEF95 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00DEF0F2 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_00DEF3F3 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DE37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_00DE37EF |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DE3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_00DE3B12 |
Source: C:\Users\user\Desktop\uIarPolvHR.exe |
Code function: 0_2_00DEBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_00DEBCBC |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
2_2_0040B335 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
2_2_0041B42F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
2_2_0040B53A |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_0044D5E9 FindFirstFileExA, |
2_2_0044D5E9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
2_2_004089A9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00406AC2 FindFirstFileW,FindNextFileW, |
2_2_00406AC2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
2_2_00407A8C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
2_2_00418C69 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
2_2_00408DA7 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2445A GetFileAttributesW,FindFirstFileW,FindClose, |
2_2_00E2445A |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2C6D1 FindFirstFileW,FindClose, |
2_2_00E2C6D1 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
2_2_00E2C75C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
2_2_00E2EF95 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
2_2_00E2F0F2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
2_2_00E2F3F3 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E237EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
2_2_00E237EF |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E23B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
2_2_00E23B12 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 2_2_00E2BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
2_2_00E2BCBC |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
5_2_0040B335 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
5_2_0041B42F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
5_2_0040B53A |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_0044D5E9 FindFirstFileExA, |
5_2_0044D5E9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
5_2_004089A9 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00406AC2 FindFirstFileW,FindNextFileW, |
5_2_00406AC2 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
5_2_00407A8C |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
5_2_00418C69 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: 5_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
5_2_00408DA7 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
2_2_004470AE |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW, |
2_2_004510BA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
2_2_004511E3 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW, |
2_2_004512EA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
2_2_004513B7 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW, |
2_2_00447597 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoA, |
2_2_0040E679 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
2_2_00450A7F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
2_2_00450CF7 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
2_2_00450D42 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
2_2_00450DDD |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
2_2_00450E6A |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
5_2_004470AE |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW, |
5_2_004510BA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
5_2_004511E3 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW, |
5_2_004512EA |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
5_2_004513B7 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW, |
5_2_00447597 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoA, |
5_2_0040E679 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
5_2_00450A7F |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
5_2_00450CF7 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
5_2_00450D42 |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: EnumSystemLocalesW, |
5_2_00450DDD |
Source: C:\Users\user\AppData\Local\Sancerre\nonhazardousness.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
5_2_00450E6A |