Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005B6CA9 GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_005B6CA9 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005B60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, |
0_2_005B60DD |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005B63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, |
0_2_005B63F9 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005BEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_005BEB60 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005BF56F FindFirstFileW,FindClose, |
0_2_005BF56F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005BF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_005BF5FA |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005C1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_005C1B2F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005C1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_005C1C8A |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005C1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_005C1F94 |
Source: RegSvcs.exe, 00000007.00000002.3730171766.0000000002D2F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://beirutrest.com |
Source: RegSvcs.exe, 00000007.00000002.3730171766.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: RegSvcs.exe, 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3729695166.000000000297E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3731382382.0000000003CB1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://account.dyn.com/ |
Source: RegSvcs.exe, 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3730171766.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3729695166.000000000297E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3731382382.0000000003CB1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ipify.org |
Source: RegSvcs.exe, 00000007.00000002.3730171766.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ipify.org/ |
Source: RegSvcs.exe, 00000007.00000002.3730171766.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ipify.org/t |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005DF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
0_2_005DF7FF |
Source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe.2300000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 00000007.00000002.3728024191.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.1279697783.0000000002300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: This is a third-party compiled AutoIt script. |
0_2_00573D19 |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
String found in binary or memory: This is a third-party compiled AutoIt script. |
|
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe, 00000000.00000002.1277214161.000000000061E000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: This is a third-party compiled AutoIt script. |
memstr_d9ae9e02-1 |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe, 00000000.00000002.1277214161.000000000061E000.00000002.00000001.01000000.00000003.sdmp |
String found in binary or memory: ZSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer |
memstr_d7c2115a-3 |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
String found in binary or memory: This is a third-party compiled AutoIt script. |
memstr_a810b0ec-2 |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer |
memstr_c9eac0fd-6 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0059B043 |
0_2_0059B043 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005A410F |
0_2_005A410F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005902A4 |
0_2_005902A4 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0057E3E3 |
0_2_0057E3E3 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005A038E |
0_2_005A038E |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005A467F |
0_2_005A467F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005906D9 |
0_2_005906D9 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005DAACE |
0_2_005DAACE |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005A4BEF |
0_2_005A4BEF |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0059CCC1 |
0_2_0059CCC1 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0057AF50 |
0_2_0057AF50 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00576F07 |
0_2_00576F07 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0058B11F |
0_2_0058B11F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0059D1B9 |
0_2_0059D1B9 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005D31BC |
0_2_005D31BC |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005A724D |
0_2_005A724D |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00583200 |
0_2_00583200 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0059123A |
0_2_0059123A |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005B13CA |
0_2_005B13CA |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005793F0 |
0_2_005793F0 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0058F563 |
0_2_0058F563 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005796C0 |
0_2_005796C0 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005BB6CC |
0_2_005BB6CC |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005DF7FF |
0_2_005DF7FF |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005777B0 |
0_2_005777B0 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005A79C9 |
0_2_005A79C9 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0058FA57 |
0_2_0058FA57 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00583B70 |
0_2_00583B70 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00579B60 |
0_2_00579B60 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0058FE6F |
0_2_0058FE6F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00599ED0 |
0_2_00599ED0 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00577FA3 |
0_2_00577FA3 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_016CD5D0 |
0_2_016CD5D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00408C60 |
7_2_00408C60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0040DC11 |
7_2_0040DC11 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00407C3F |
7_2_00407C3F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00418CCC |
7_2_00418CCC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00406CA0 |
7_2_00406CA0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_004028B0 |
7_2_004028B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0041A4BE |
7_2_0041A4BE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00418244 |
7_2_00418244 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00401650 |
7_2_00401650 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00402F20 |
7_2_00402F20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_004193C4 |
7_2_004193C4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00418788 |
7_2_00418788 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00402F89 |
7_2_00402F89 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00402B90 |
7_2_00402B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_004073A0 |
7_2_004073A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0293CDC8 |
7_2_0293CDC8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0293D9E0 |
7_2_0293D9E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_02931298 |
7_2_02931298 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_02931030 |
7_2_02931030 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_02931022 |
7_2_02931022 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0293D110 |
7_2_0293D110 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_061FEE78 |
7_2_061FEE78 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_061F9738 |
7_2_061F9738 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_061FBD98 |
7_2_061FBD98 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_061F6318 |
7_2_061F6318 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_061FF5D0 |
7_2_061FF5D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_061F0027 |
7_2_061F0027 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_061F0040 |
7_2_061F0040 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_06615238 |
7_2_06615238 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0661A0F8 |
7_2_0661A0F8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_066161B0 |
7_2_066161B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_06611538 |
7_2_06611538 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_066183B0 |
7_2_066183B0 |
Source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe.2300000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 00000007.00000002.3728024191.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.1279697783.0000000002300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, NpXw3kw.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, NpXw3kw.cs |
Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, gyfrCFT5x9I.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, gyfrCFT5x9I.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, gyfrCFT5x9I.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, gyfrCFT5x9I.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00596B05 push ecx; ret |
0_2_00596B18 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0059BDAA push edi; ret |
0_2_0059BDAC |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0059BEC3 push esi; ret |
0_2_0059BEC5 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0041C40C push cs; iretd |
7_2_0041C4E2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_00423149 push eax; ret |
7_2_00423179 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0041C50E push cs; iretd |
7_2_0041C4E2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_004231C8 push eax; ret |
7_2_00423179 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0040E21D push ecx; ret |
7_2_0040E230 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0041C6BE push ebx; ret |
7_2_0041C6BF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_02933222 push edx; retf |
7_2_02933224 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_02932272 push edx; retf |
7_2_02932273 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_02934705 pushfd ; retf |
7_2_02934719 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_029348CC push edx; retf |
7_2_029348CE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_02934C64 push edx; retf |
7_2_02934C65 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0293392E push edx; retf |
7_2_0293392F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0293557C push edx; retf |
7_2_0293557D |
Source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'P5nvKpNArGjwP', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'P5nvKpNArGjwP', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'P5nvKpNArGjwP', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'P5nvKpNArGjwP', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'P5nvKpNArGjwP', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005D8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, |
0_2_005D8111 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0058EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, |
0_2_0058EB42 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_0059123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_0059123A |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear, |
7_2_004019F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599422 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599312 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599203 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599094 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598969 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598856 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598750 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598640 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598531 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598422 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598312 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598203 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598094 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597984 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597875 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597766 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597641 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597516 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597405 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597297 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597187 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597078 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596969 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596859 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596750 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596640 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596531 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596422 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596312 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596203 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596094 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595984 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595861 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595734 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595625 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595515 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595406 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595297 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595187 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595078 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594968 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594859 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594750 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594640 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594531 |
Jump to behavior |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005B6CA9 GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_005B6CA9 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005B60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, |
0_2_005B60DD |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005B63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, |
0_2_005B63F9 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005BEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_005BEB60 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005BF56F FindFirstFileW,FindClose, |
0_2_005BF56F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005BF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_005BF5FA |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005C1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_005C1B2F |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005C1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_005C1C8A |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005C1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_005C1F94 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599422 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599312 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599203 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 599094 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598969 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598856 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598750 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598640 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598531 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598422 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598312 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598203 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 598094 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597984 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597875 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597766 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597641 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597516 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597405 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597297 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597187 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 597078 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596969 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596859 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596750 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596640 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596531 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596422 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596312 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596203 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 596094 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595984 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595861 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595734 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595625 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595515 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595406 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595297 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595187 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 595078 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594968 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594859 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594750 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594640 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 594531 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear, |
7_2_004019F0 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_00598189 SetUnhandledExceptionFilter, |
0_2_00598189 |
Source: C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Code function: 0_2_005981AC SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_005981AC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
7_2_0040CE09 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
7_2_0040E61C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 7_2_004123F1 SetUnhandledExceptionFilter, |
7_2_004123F1 |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000007.00000002.3729695166.000000000297E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3730171766.0000000002D2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3730171766.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3731382382.0000000003CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: RegSvcs.exe PID: 7820, type: MEMORYSTR |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000007.00000002.3729695166.000000000297E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3731382382.0000000003CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Binary or memory string: WIN_81 |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Binary or memory string: WIN_XP |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Binary or memory string: WIN_XPe |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Binary or memory string: WIN_VISTA |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Binary or memory string: WIN_7 |
Source: CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe |
Binary or memory string: WIN_8 |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000007.00000002.3729695166.000000000297E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3730171766.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3731382382.0000000003CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: RegSvcs.exe PID: 7820, type: MEMORYSTR |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000007.00000002.3729695166.000000000297E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3730171766.0000000002D2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3730171766.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3731382382.0000000003CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: RegSvcs.exe PID: 7820, type: MEMORYSTR |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.5340000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bef46.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3d02f90.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.2ab0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.29bfe2e.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 7.2.RegSvcs.exe.3cb5570.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000007.00000002.3729695166.000000000297E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3729783954.0000000002AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3732059768.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.3731382382.0000000003CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |