Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004084F3 lstrcmp,CryptDecodeObject,LocalAlloc,CryptDecodeObject, |
0_2_004084F3 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_00408E76 LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCRLContext,CertFreeCRLContext,CertCloseStore,CryptMsgClose, |
0_2_00408E76 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_00408636 lstrcmp,CryptDecodeObject,FileTimeToLocalFileTime,FileTimeToSystemTime, |
0_2_00408636 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004086CE lstrcmp,CryptDecodeObject,CryptDecodeObject,LocalAlloc,CryptDecodeObject, |
0_2_004086CE |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004087AE _strlen,MultiByteToWideChar,CryptQueryObject,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,CryptMsgGetParam,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,CertFindCertificateInStore,_strlen,CertFindCertificateInStore,SystemTimeToFileTime,CertVerifyTimeValidity, |
0_2_004087AE |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, |
2_2_000F293A |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004084F3 lstrcmpA,CryptDecodeObject,LocalAlloc,CryptDecodeObject, |
2_2_004084F3 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_00408636 lstrcmpA,CryptDecodeObject,FileTimeToLocalFileTime,FileTimeToSystemTime, |
2_2_00408636 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004086CE lstrcmpA,CryptDecodeObject,CryptDecodeObject,LocalAlloc,CryptDecodeObject, |
2_2_004086CE |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004087AE _strlen,MultiByteToWideChar,CryptQueryObject,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,CryptMsgGetParam,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,CertFindCertificateInStore,_strlen,CertFindCertificateInStore,SystemTimeToFileTime,CertVerifyTimeValidity, |
2_2_004087AE |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_00408E76 LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CertFreeCertificateContext,CertCloseStore,CryptMsgClose, |
2_2_00408E76 |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000CB335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
2_2_000CB335 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000DB42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
2_2_000DB42F |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000CB53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
2_2_000CB53A |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0010D5E9 FindFirstFileExA, |
2_2_0010D5E9 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C89A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
2_2_000C89A9 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C7A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
2_2_000C7A8C |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C6AC2 FindFirstFileW,FindNextFileW, |
2_2_000C6AC2 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000D8C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
2_2_000D8C69 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C8DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
2_2_000C8DA7 |
Source: 4wECQoBvYC.exe, 00000002.00000003.2200531420.0000000001B25000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/ |
Source: 4wECQoBvYC.exe, 4wECQoBvYC.exe, 00000002.00000002.3272233299.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp, 4wECQoBvYC.exe, 00000002.00000003.2200531420.0000000001B04000.00000004.00000020.00020000.00000000.sdmp, 4wECQoBvYC.exe, 00000002.00000003.2200531420.0000000001B25000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp |
Source: 4wECQoBvYC.exe, 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, 4wECQoBvYC.exe, 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, 4wECQoBvYC.exe, 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: 4wECQoBvYC.exe, 00000002.00000003.2200531420.0000000001B25000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp: |
Source: 4wECQoBvYC.exe, 00000002.00000003.2200531420.0000000001B04000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gpSystem32 |
Source: 4wECQoBvYC.exe, 00000002.00000003.2200531420.0000000001B04000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gpl |
Source: 4wECQoBvYC.exe, 00000002.00000003.2200531420.0000000001B25000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gpq |
Source: PerfectouinVans.exe.0.dr |
String found in binary or memory: http://www.evenbalance.com/ |
Source: PerfectouinVans.exe.0.dr |
String found in binary or memory: http://www.evenbalance.com/index.php?page=pbsvcfaq.php |
Source: PerfectouinVans.exe.0.dr |
String found in binary or memory: http://www.evenbalance.com/index.php?page=pbsvcfaq.phpChecking |
Source: 4wECQoBvYC.exe, PerfectouinVans.exe.0.dr |
String found in binary or memory: http://www.evenbalance.com/index.php?page=pbsvcfaq.phpDisplayVersion%d.%dDisplayNamePunkBuster |
Source: 4wECQoBvYC.exe |
String found in binary or memory: http://www.evenbalance.com/troubletick |
Source: PerfectouinVans.exe.0.dr |
String found in binary or memory: http://www.evenbalance.com/troubleticket/ |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |
Source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004BF370 |
0_2_004BF370 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004C4DBB |
0_2_004C4DBB |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000DD071 |
2_2_000DD071 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000FD098 |
2_2_000FD098 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_001120D2 |
2_2_001120D2 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F7150 |
2_2_000F7150 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F61AA |
2_2_000F61AA |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000E6254 |
2_2_000E6254 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F1377 |
2_2_000F1377 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F651C |
2_2_000F651C |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000DE5DF |
2_2_000DE5DF |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0010C739 |
2_2_0010C739 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000E67CB |
2_2_000E67CB |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F67C6 |
2_2_000F67C6 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000FC9DD |
2_2_000FC9DD |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F2A49 |
2_2_000F2A49 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F6A8D |
2_2_000F6A8D |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000FCC0C |
2_2_000FCC0C |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F4D22 |
2_2_000F4D22 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F6D48 |
2_2_000F6D48 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_00100E20 |
2_2_00100E20 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000FCE3B |
2_2_000FCE3B |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000E6E73 |
2_2_000E6E73 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_00112F00 |
2_2_00112F00 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000D2F45 |
2_2_000D2F45 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000E6FAD |
2_2_000E6FAD |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004BF370 |
2_2_004BF370 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004C4DBB |
2_2_004C4DBB |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 000C1F66 appears 49 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 004010F0 appears 34 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 000F38A5 appears 41 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 000F3FB0 appears 55 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 004BC0F4 appears 126 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 000C20E7 appears 41 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 004BD2C8 appears 82 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 00401072 appears 114 times |
|
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: String function: 0048CFD0 appears 50 times |
|
Source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004090DF GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, |
0_2_004090DF |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000D6AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, |
2_2_000D6AB7 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004090DF GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, |
2_2_004090DF |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: You must specify install or un-install when using the no-display command-line switch. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: You must specify install or un-install when using the no-prompts command-line switch. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-Install PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Are you sure you want to un-install the PunkBuster Service? |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-installing |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: Could not read PnkBstrB port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: Could not read PnkBstrA port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: The version of PnkBstrA installed on your system is outdated. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: This program will help you install or un-install the PunkBuster Anti-cheat service. Please make your selection and then click "Next" to continue. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Install/Re-Install PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-Install/Remove PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: This program will help you install or un-install the PunkBuster Anti-cheat service.Please make your selection and then click "Next" to continue. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-Install PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Are you sure you want to un-install the PunkBuster Service? |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: You must specify install or un-install when using the no-display command-line switch. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: You must specify install or un-install when using the no-prompts command-line switch. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-installing |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: Could not read PnkBstrB port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: Could not read PnkBstrA port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: The version of PnkBstrA installed on your system is outdated. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: This program will help you install or un-install the PunkBuster Anti-cheat service. Please make your selection and then click "Next" to continue. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Install/Re-Install PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-Install/Remove PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: This program will help you install or un-install the PunkBuster Anti-cheat service.Please make your selection and then click "Next" to continue. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: Could not read PnkBstrB port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: Could not read PnkBstrA port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: The version of PnkBstrA installed on your system is outdated. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Stopping PnkBstrKCould not query the PnkBstrK driverPnkBstrKChecking PnkBstrK driver statusReceiving version from PnkBstrBSending version packet to PnkBstrB **ERROR: Could not read PnkBstrB port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support.Getting port for PnkBstrBCHANGED (%ld) |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: Could not read PnkBstrA port registry entry. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support.PortGetting port for PnkBstrANOT RUNNING |
Source: 4wECQoBvYC.exe |
String found in binary or memory: PnkBstrB file not found **ERROR: The version of PnkBstrA installed on your system is outdated. Please first uninstall and re-install using this application. If you still have problems, please contact Even Balance at http://www.evenbalance.com/ for further support.OUTDATED (%ld) |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: You must specify install or un-install when using the no-display command-line switch. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: You must specify install or un-install when using the no-prompts command-line switch. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: **ERROR: You must specify install or un-install when using the no-display command-line switch. **ERROR: You must specify install or un-install when using the no-prompts command-line switch.q2.8 (no debug,ANSI,Visual C++,wx containers,compatible with 2.6)your program |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Are you sure you want to un-install the PunkBuster Service? |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-Install PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: @PunkBuster Service Setup v%d.%d %s - Step 1 of 2PunkBuster Service Setup v%d.%d %s- Step 1 of 3Are you sure you want to un-install the PunkBuster Service?Un-Install PunkBuster ServiceP Q |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-installing |
Source: 4wECQoBvYC.exe |
String found in binary or memory: @PunkBuster Service Setup v%d.%d %s - Step 3 of 3 - %sPunkBuster Service Setup v%d.%d %s - Step 2 of 2 - %sUn-installingInstalling`!Q |
Source: 4wECQoBvYC.exe |
String found in binary or memory: This program will help you install or un-install the PunkBuster Anti-cheat service. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Un-Install/Remove PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: Install/Re-Install PunkBuster Service |
Source: 4wECQoBvYC.exe |
String found in binary or memory: &Test ServicesUn-Install/Remove PunkBuster ServiceInstall/Re-Install PunkBuster ServicePunkBuster Service SetupFinished! NOTE: A reboot may be necessary to completely remove the service files.Installation Finished. |
Source: 4wECQoBvYC.exe |
String found in binary or memory: <!--StartFrag |
Source: 4wECQoBvYC.exe |
String found in binary or memory: <!--StartFragment --> |
Source: 4wECQoBvYC.exe |
String found in binary or memory: hAFailed to put data on the clipboardFailed to set clipboard data.<!--EndFragEndFragment<!--StartFragStartFragmentEndHTML%08u<html>StartHTML<!--EndFragment--> |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: k7rn7l32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: ntd3ll.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: policymanager.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: msvcp110_win.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: vbscript.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: mlang.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000DBCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress, |
2_2_000DBCE3 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_0048D070 push ecx; mov dword ptr [esp], 00000000h |
0_2_0048D086 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004BC0F4 push eax; ret |
0_2_004BC112 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004BD303 push ecx; ret |
0_2_004BD313 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004BC670 push eax; ret |
0_2_004BC684 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_004BC670 push eax; ret |
0_2_004BC6AC |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 0_2_0048CFD0 push ecx; mov dword ptr [esp], 00000000h |
0_2_0048CFE6 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_001167E0 push eax; ret |
2_2_001167FE |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0011B9DD push esi; ret |
2_2_0011B9E6 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0011CCDC push esp; retf 0011h |
2_2_0011CCDD |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0011CD3C pushad ; retf |
2_2_0011CD3D |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0011CD28 push eax; retf |
2_2_0011CD39 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0011CD60 pushad ; retf |
2_2_0011CD3D |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_00115EAF push ecx; ret |
2_2_00115EC2 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000F3FF6 push ecx; ret |
2_2_000F4009 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0048D070 push ecx; mov dword ptr [esp], 00000000h |
2_2_0048D086 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004BC0F4 push eax; ret |
2_2_004BC112 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004BD303 push ecx; ret |
2_2_004BD313 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004BC670 push eax; ret |
2_2_004BC684 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_004BC670 push eax; ret |
2_2_004BC6AC |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0046AEA0 pushfd ; iretd |
2_2_0046AEB6 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0048CFD0 push ecx; mov dword ptr [esp], 00000000h |
2_2_0048CFE6 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0046AFF0 pushfd ; iretd |
2_2_0046B085 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0046AFF0 pushfd ; iretd |
2_2_0046B0D3 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0046AF80 pushfd ; iretd |
2_2_0046B085 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000DBCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress, |
2_2_000DBCE3 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000CB335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
2_2_000CB335 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000DB42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
2_2_000DB42F |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000CB53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
2_2_000CB53A |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_0010D5E9 FindFirstFileExA, |
2_2_0010D5E9 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C89A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
2_2_000C89A9 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C7A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
2_2_000C7A8C |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C6AC2 FindFirstFileW,FindNextFileW, |
2_2_000C6AC2 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000D8C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
2_2_000D8C69 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000C8DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
2_2_000C8DA7 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: 2_2_000DBCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress, |
2_2_000DBCE3 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: GetLocaleInfoA, |
2_2_000CE679 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: GetLocaleInfoW, |
2_2_001110BA |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: EnumSystemLocalesW, |
2_2_001070AE |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
2_2_001111E3 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: GetLocaleInfoW, |
2_2_001112EA |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
2_2_001113B7 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: GetLocaleInfoW, |
2_2_00107597 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
2_2_00110A7F |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: EnumSystemLocalesW, |
2_2_00110CF7 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: EnumSystemLocalesW, |
2_2_00110D42 |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: EnumSystemLocalesW, |
2_2_00110DDD |
Source: C:\Users\user\Desktop\4wECQoBvYC.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
2_2_00110E6A |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.21b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.4wECQoBvYC.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.700c62.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.4wECQoBvYC.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2197049819.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2196584231.0000000000700000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.3270022231.00000000000C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6172, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: 4wECQoBvYC.exe PID: 6580, type: MEMORYSTR |