Source: Yara match | File source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000007.00000002.3876562999.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876896183.0000000004E1E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876601412.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 7876, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7916, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 8080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8100, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0010445A |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010C6D1 FindFirstFileW,FindClose, | 0_2_0010C6D1 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_0010C75C |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0010EF95 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0010F0F2 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0010F3F3 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_001037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_001037EF |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_00103B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00103B12 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0010BCBC |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091445A GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_0091445A |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091C6D1 FindFirstFileW,FindClose, | 2_2_0091C6D1 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0091C75C |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0091EF95 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0091F0F2 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0091F3F3 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_009137EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_009137EF |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_00913B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00913B12 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0091BCBC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 3_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 3_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 3_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00407877 FindFirstFileW,FindNextFileW, | 3_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044E8F9 FindFirstFileExA, | 3_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 3_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 3_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 3_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 7_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 7_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 7_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 7_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 7_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00407877 FindFirstFileW,FindNextFileW, | 7_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0044E8F9 FindFirstFileExA, | 7_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 7_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 7_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 7_2_0040BD72 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0012CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_0012CABC |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0093CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_0093CABC |
Source: Yara match | File source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000007.00000002.3876562999.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876896183.0000000004E1E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876601412.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 7876, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7916, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 8080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8100, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: derogates.exe PID: 7876, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 7916, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: derogates.exe PID: 8080, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 8100, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: This is a third-party compiled AutoIt script. | 0_2_000A3B3A |
Source: MLxloAVuCZ.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: MLxloAVuCZ.exe, 00000000.00000003.1433226327.0000000003B83000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_1ee70dea-6 |
Source: MLxloAVuCZ.exe, 00000000.00000003.1433226327.0000000003B83000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_b66d9bf2-6 |
Source: MLxloAVuCZ.exe, 00000000.00000000.1423016365.0000000000154000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_e0156cda-a |
Source: MLxloAVuCZ.exe, 00000000.00000000.1423016365.0000000000154000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_e7a032b9-b |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: This is a third-party compiled AutoIt script. | 2_2_008B3B3A |
Source: derogates.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: derogates.exe, 00000002.00000000.1433722723.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_d3897278-b |
Source: derogates.exe, 00000002.00000000.1433722723.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_a2da74e1-4 |
Source: derogates.exe, 00000006.00000002.1569373716.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_359de1fa-4 |
Source: derogates.exe, 00000006.00000002.1569373716.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_f5f63f53-4 |
Source: MLxloAVuCZ.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_5571c604-5 |
Source: MLxloAVuCZ.exe | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_b085a12c-6 |
Source: derogates.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_2196b966-a |
Source: derogates.exe.0.dr | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_ab4b6369-6 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000CD975 | 0_2_000CD975 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000C21C5 | 0_2_000C21C5 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000D62D2 | 0_2_000D62D2 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_001203DA | 0_2_001203DA |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000D242E | 0_2_000D242E |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000C25FA | 0_2_000C25FA |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000FE616 | 0_2_000FE616 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000AE6A0 | 0_2_000AE6A0 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000B66E1 | 0_2_000B66E1 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000D878F | 0_2_000D878F |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000B8808 | 0_2_000B8808 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_00120857 | 0_2_00120857 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000D6844 | 0_2_000D6844 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_00108889 | 0_2_00108889 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000CCB21 | 0_2_000CCB21 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000D6DB6 | 0_2_000D6DB6 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000B6F9E | 0_2_000B6F9E |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000B3030 | 0_2_000B3030 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000C3187 | 0_2_000C3187 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000CF1D9 | 0_2_000CF1D9 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000A1287 | 0_2_000A1287 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000C1484 | 0_2_000C1484 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000B5520 | 0_2_000B5520 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000C7696 | 0_2_000C7696 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000B5760 | 0_2_000B5760 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000C1978 | 0_2_000C1978 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000D9AB5 | 0_2_000D9AB5 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000AFCE0 | 0_2_000AFCE0 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000C1D90 | 0_2_000C1D90 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000CBDA6 | 0_2_000CBDA6 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_00127DDB | 0_2_00127DDB |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000ADF00 | 0_2_000ADF00 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000B3FE0 | 0_2_000B3FE0 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_01377E78 | 0_2_01377E78 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008DD975 | 2_2_008DD975 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008D21C5 | 2_2_008D21C5 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008E62D2 | 2_2_008E62D2 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_009303DA | 2_2_009303DA |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008E242E | 2_2_008E242E |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008D25FA | 2_2_008D25FA |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008BE6A0 | 2_2_008BE6A0 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008C66E1 | 2_2_008C66E1 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0090E616 | 2_2_0090E616 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008E878F | 2_2_008E878F |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_00918889 | 2_2_00918889 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008C8808 | 2_2_008C8808 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_00930857 | 2_2_00930857 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008E6844 | 2_2_008E6844 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008DCB21 | 2_2_008DCB21 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008E6DB6 | 2_2_008E6DB6 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008C6F9E | 2_2_008C6F9E |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008C3030 | 2_2_008C3030 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008D3187 | 2_2_008D3187 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008DF1D9 | 2_2_008DF1D9 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008B1287 | 2_2_008B1287 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008D1484 | 2_2_008D1484 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008C5520 | 2_2_008C5520 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008D7696 | 2_2_008D7696 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008C5760 | 2_2_008C5760 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008D1978 | 2_2_008D1978 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008E9AB5 | 2_2_008E9AB5 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008BFCE0 | 2_2_008BFCE0 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008D1D90 | 2_2_008D1D90 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008DBDA6 | 2_2_008DBDA6 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_00937DDB | 2_2_00937DDB |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008C3FE0 | 2_2_008C3FE0 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008BDF00 | 2_2_008BDF00 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_01486940 | 2_2_01486940 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043706A | 3_2_0043706A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00414005 | 3_2_00414005 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043E11C | 3_2_0043E11C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004541D9 | 3_2_004541D9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004381E8 | 3_2_004381E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041F18B | 3_2_0041F18B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00446270 | 3_2_00446270 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043E34B | 3_2_0043E34B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004533AB | 3_2_004533AB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0042742E | 3_2_0042742E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00437566 | 3_2_00437566 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043E5A8 | 3_2_0043E5A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004387F0 | 3_2_004387F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043797E | 3_2_0043797E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004339D7 | 3_2_004339D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044DA49 | 3_2_0044DA49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00427AD7 | 3_2_00427AD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041DBF3 | 3_2_0041DBF3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00427C40 | 3_2_00427C40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00437DB3 | 3_2_00437DB3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00435EEB | 3_2_00435EEB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043DEED | 3_2_0043DEED |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00426E9F | 3_2_00426E9F |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00632720 | 4_2_00632720 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 6_2_00F20760 | 6_2_00F20760 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043706A | 7_2_0043706A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00414005 | 7_2_00414005 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043E11C | 7_2_0043E11C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_004541D9 | 7_2_004541D9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_004381E8 | 7_2_004381E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0041F18B | 7_2_0041F18B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00446270 | 7_2_00446270 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043E34B | 7_2_0043E34B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_004533AB | 7_2_004533AB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0042742E | 7_2_0042742E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00437566 | 7_2_00437566 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043E5A8 | 7_2_0043E5A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_004387F0 | 7_2_004387F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043797E | 7_2_0043797E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_004339D7 | 7_2_004339D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0044DA49 | 7_2_0044DA49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00427AD7 | 7_2_00427AD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0041DBF3 | 7_2_0041DBF3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00427C40 | 7_2_00427C40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00437DB3 | 7_2_00437DB3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00435EEB | 7_2_00435EEB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043DEED | 7_2_0043DEED |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00426E9F | 7_2_00426E9F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00402213 appears 38 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 004052FD appears 32 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 0040417E appears 46 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00402093 appears 100 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00401E65 appears 68 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00434E70 appears 108 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00401FAB appears 38 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 004020DF appears 40 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00434801 appears 82 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00457AA8 appears 34 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00445951 appears 56 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 0044854A appears 36 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00411FA2 appears 32 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 004046F7 appears 34 times | |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: String function: 008D8900 appears 42 times | |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: String function: 008D0AE3 appears 70 times | |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: String function: 008B7DE1 appears 35 times | |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: String function: 000A7DE1 appears 35 times | |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: String function: 000C8900 appears 42 times | |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: String function: 000C0AE3 appears 70 times | |
Source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: derogates.exe PID: 7876, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 7916, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: derogates.exe PID: 8080, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 8100, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000A48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_000A48D7 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_00125376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_00125376 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008B48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 2_2_008B48D7 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_00935376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 2_2_00935376 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0010445A |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010C6D1 FindFirstFileW,FindClose, | 0_2_0010C6D1 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_0010C75C |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0010EF95 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0010F0F2 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0010F3F3 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_001037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_001037EF |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_00103B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00103B12 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_0010BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0010BCBC |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091445A GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_0091445A |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091C6D1 FindFirstFileW,FindClose, | 2_2_0091C6D1 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0091C75C |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0091EF95 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0091F0F2 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0091F3F3 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_009137EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_009137EF |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_00913B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00913B12 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_0091BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0091BCBC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 3_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 3_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 3_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00407877 FindFirstFileW,FindNextFileW, | 3_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044E8F9 FindFirstFileExA, | 3_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 3_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 3_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 3_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 7_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 7_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 7_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 7_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 7_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00407877 FindFirstFileW,FindNextFileW, | 7_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0044E8F9 FindFirstFileExA, | 7_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 7_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 7_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 7_2_0040BD72 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_01376698 mov eax, dword ptr fs:[00000030h] | 0_2_01376698 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_01377D08 mov eax, dword ptr fs:[00000030h] | 0_2_01377D08 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_01377D68 mov eax, dword ptr fs:[00000030h] | 0_2_01377D68 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_01485160 mov eax, dword ptr fs:[00000030h] | 2_2_01485160 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_014867D0 mov eax, dword ptr fs:[00000030h] | 2_2_014867D0 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_01486830 mov eax, dword ptr fs:[00000030h] | 2_2_01486830 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00443355 mov eax, dword ptr fs:[00000030h] | 3_2_00443355 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00633060 mov eax, dword ptr fs:[00000030h] | 4_2_00633060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00633060 mov eax, dword ptr fs:[00000030h] | 4_2_00633060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00633060 mov eax, dword ptr fs:[00000030h] | 4_2_00633060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00633060 mov eax, dword ptr fs:[00000030h] | 4_2_00633060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00633540 mov eax, dword ptr fs:[00000030h] | 4_2_00633540 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00633540 mov eax, dword ptr fs:[00000030h] | 4_2_00633540 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00633540 mov eax, dword ptr fs:[00000030h] | 4_2_00633540 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_006356A0 mov eax, dword ptr fs:[00000030h] | 4_2_006356A0 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_006356A0 mov ecx, dword ptr fs:[00000030h] | 4_2_006356A0 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00634610 mov eax, dword ptr fs:[00000030h] | 4_2_00634610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00634610 mov eax, dword ptr fs:[00000030h] | 4_2_00634610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00634610 mov eax, dword ptr fs:[00000030h] | 4_2_00634610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00634610 mov eax, dword ptr fs:[00000030h] | 4_2_00634610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00634410 mov eax, dword ptr fs:[00000030h] | 4_2_00634410 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_00634410 mov eax, dword ptr fs:[00000030h] | 4_2_00634410 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 6_2_00F205F0 mov eax, dword ptr fs:[00000030h] | 6_2_00F205F0 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 6_2_00F20650 mov eax, dword ptr fs:[00000030h] | 6_2_00F20650 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 6_2_00F1EF80 mov eax, dword ptr fs:[00000030h] | 6_2_00F1EF80 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00443355 mov eax, dword ptr fs:[00000030h] | 7_2_00443355 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000CA124 SetUnhandledExceptionFilter, | 0_2_000CA124 |
Source: C:\Users\user\Desktop\MLxloAVuCZ.exe | Code function: 0_2_000CA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_000CA155 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008DA124 SetUnhandledExceptionFilter, | 2_2_008DA124 |
Source: C:\Users\user\AppData\Local\miaou\derogates.exe | Code function: 2_2_008DA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_008DA155 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_0043503C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00434A8A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_0043BB71 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00434BD8 SetUnhandledExceptionFilter, | 3_2_00434BD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 7_2_0043503C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 7_2_00434A8A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 7_2_0043BB71 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 7_2_00434BD8 SetUnhandledExceptionFilter, | 7_2_00434BD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_0045201B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_004520B6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 3_2_00452143 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_00452393 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_00448484 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 3_2_004524BC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_004525C3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 3_2_00452690 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_0044896D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 3_2_0040F90C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 3_2_00451D58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_00451FD0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 7_2_0045201B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 7_2_004520B6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 7_2_00452143 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 7_2_00452393 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 7_2_00448484 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 7_2_004524BC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 7_2_004525C3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 7_2_00452690 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 7_2_0044896D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 7_2_0040F90C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 7_2_00451D58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 7_2_00451FD0 |
Source: Yara match | File source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000007.00000002.3876562999.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876896183.0000000004E1E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876601412.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 7876, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7916, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 8080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8100, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: Yara match | File source: 2.2.derogates.exe.b40000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.derogates.exe.b40000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.derogates.exe.c70000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000007.00000002.3876562999.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876896183.0000000004E1E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3876601412.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1456080422.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.3875944290.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1569823464.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1453719778.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 7876, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7916, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: derogates.exe PID: 8080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8100, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |