Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_029C5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, |
0_2_029C5908 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
8_2_027C928E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027DC322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, |
8_2_027DC322 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027CC388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, |
8_2_027CC388 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C96A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
8_2_027C96A0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027CBB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
8_2_027CBB6B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027D9B86 FindFirstFileW,FindNextFileW,FindNextFileW, |
8_2_027D9B86 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C7877 FindFirstFileW,FindNextFileW, |
8_2_027C7877 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C8847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, |
8_2_027C8847 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_0280E8F9 FindFirstFileExA, |
8_2_0280E8F9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027CBD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
8_2_027CBD72 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
11_2_027C928E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027DC322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, |
11_2_027DC322 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027CC388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, |
11_2_027CC388 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C96A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
11_2_027C96A0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027CBB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
11_2_027CBB6B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027D9B86 FindFirstFileW,FindNextFileW,FindNextFileW, |
11_2_027D9B86 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C7877 FindFirstFileW,FindNextFileW, |
11_2_027C7877 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C8847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, |
11_2_027C8847 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_0280E8F9 FindFirstFileExA, |
11_2_0280E8F9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027CBD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
11_2_027CBD72 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
13_2_0280928E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, |
13_2_0280C388 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0281C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, |
13_2_0281C322 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_028096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
13_2_028096A0 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02819B86 FindFirstFileW,FindNextFileW,FindNextFileW, |
13_2_02819B86 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
13_2_0280BB6B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0284E8F9 FindFirstFileExA, |
13_2_0284E8F9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02808847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, |
13_2_02808847 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02807877 FindFirstFileW,FindNextFileW, |
13_2_02807877 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
13_2_0280BD72 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0# |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: colorcpl.exe, SndVol.exe |
String found in binary or memory: http://geoplugin.net/json.gp |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2170737614.000000007EAA0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000002.2150744964.0000000002A47000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000008.00000002.4491421481.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000B.00000002.2240919016.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000000D.00000002.2322085295.0000000002800000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.comodoca.com0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0A |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0C |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0X |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.sectigo.com0 |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.sectigo.com0C |
Source: D2pQ4J4GGZ.exe, D2pQ4J4GGZ.exe, 00000000.00000002.2175474410.000000007FC4F000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000002.2149724742.00000000024CA000.00000004.00000020.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000002.2150540153.00000000029EE000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2032389922.000000007FB1F000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2032127390.00000000024C5000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.pmail.com |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1. |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/; |
Source: D2pQ4J4GGZ.exe, 00000000.00000003.2130559625.00000000007E7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/e427e629-62a6-4ecd-bf22-56e4d6ea083f/downloads/0d838bb6-e11a- |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/g9g |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443/e427e629-62a6-4ecd-bf22-56e4d6ea083f/downloads/0d838bb6-e |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.000000000076D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bitbucket.org/ |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2164833746.00000000207AD000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: https://bitbucket.org/ntim1478/gpmaw/dow |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2164833746.0000000020717000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.000000000071E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bitbucket.org/ntim1478/gpmaw/downloads/250_Vjrsafyhidj |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.000000000071E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bitbucket.org/ntim1478/gpmaw/downloads/250_Vjrsafyhidjp |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2147688027.00000000007AE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.cookielaw.org/ |
Source: D2pQ4J4GGZ.exe, 00000000.00000002.2173590906.000000007F3E0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108744484.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, D2pQ4J4GGZ.exe, 00000000.00000003.2108137542.000000007ED20000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: https://sectigo.com/CPS0 |
Source: 13.2.SndVol.exe.2800000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 13.2.SndVol.exe.2800000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 13.2.SndVol.exe.2800000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 13.2.SndVol.exe.2800000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 13.2.SndVol.exe.2800000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 13.2.SndVol.exe.2800000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.D2pQ4J4GGZ.exe.29c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.D2pQ4J4GGZ.exe.29c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000D.00000002.2322085295.0000000002800000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000D.00000002.2322085295.0000000002800000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000D.00000002.2322085295.0000000002800000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000B.00000002.2240919016.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000B.00000002.2240919016.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000B.00000002.2240919016.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000000.00000002.2170737614.000000007EAA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000000.00000002.2150744964.0000000002A47000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000008.00000002.4491421481.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000008.00000002.4491421481.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000008.00000002.4491421481.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: D2pQ4J4GGZ.exe PID: 6804, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: colorcpl.exe PID: 5804, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: colorcpl.exe PID: 2964, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: SndVol.exe PID: 6608, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_029C20C4 |
0_2_029C20C4 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A6671B |
0_2_02A6671B |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A6E42F |
0_2_02A6E42F |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A7E5FA |
0_2_02A7E5FA |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A6E9BE |
0_2_02A6E9BE |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A9A93B |
0_2_02A9A93B |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A94FD9 |
0_2_02A94FD9 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A7AF67 |
0_2_02A7AF67 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A6F067 |
0_2_02A6F067 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A65183 |
0_2_02A65183 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A6F1D0 |
0_2_02A6F1D0 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A856AC |
0_2_02A856AC |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A9B769 |
0_2_02A9B769 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A8547D |
0_2_02A8547D |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A5B595 |
0_2_02A5B595 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A85B38 |
0_2_02A85B38 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A858DB |
0_2_02A858DB |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A8D800 |
0_2_02A8D800 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_02A7FD80 |
0_2_02A7FD80 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02806270 |
8_2_02806270 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_028133AB |
8_2_028133AB |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027FE34B |
8_2_027FE34B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F706A |
8_2_027F706A |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027D4005 |
8_2_027D4005 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_028141D9 |
8_2_028141D9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027FE11C |
8_2_027FE11C |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F81E8 |
8_2_027F81E8 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027DF18B |
8_2_027DF18B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F87F0 |
8_2_027F87F0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027E742E |
8_2_027E742E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F7566 |
8_2_027F7566 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027FE5A8 |
8_2_027FE5A8 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027E7AD7 |
8_2_027E7AD7 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_0280DA49 |
8_2_0280DA49 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027DDBF3 |
8_2_027DDBF3 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F797E |
8_2_027F797E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F39D7 |
8_2_027F39D7 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027FDEED |
8_2_027FDEED |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F5EEB |
8_2_027F5EEB |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027E6E9F |
8_2_027E6E9F |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027E7C40 |
8_2_027E7C40 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027F7DB3 |
8_2_027F7DB3 |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Code function: 10_2_02A220C4 |
10_2_02A220C4 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_02806270 |
11_2_02806270 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_028133AB |
11_2_028133AB |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027FE34B |
11_2_027FE34B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F706A |
11_2_027F706A |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027D4005 |
11_2_027D4005 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_028141D9 |
11_2_028141D9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027FE11C |
11_2_027FE11C |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F81E8 |
11_2_027F81E8 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027DF18B |
11_2_027DF18B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F87F0 |
11_2_027F87F0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027E742E |
11_2_027E742E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F7566 |
11_2_027F7566 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027FE5A8 |
11_2_027FE5A8 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027E7AD7 |
11_2_027E7AD7 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_0280DA49 |
11_2_0280DA49 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027DDBF3 |
11_2_027DDBF3 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F797E |
11_2_027F797E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F39D7 |
11_2_027F39D7 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027FDEED |
11_2_027FDEED |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F5EEB |
11_2_027F5EEB |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027E6E9F |
11_2_027E6E9F |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027E7C40 |
11_2_027E7C40 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027F7DB3 |
11_2_027F7DB3 |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Code function: 12_2_029A20C4 |
12_2_029A20C4 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02846270 |
13_2_02846270 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_028533AB |
13_2_028533AB |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0283E34B |
13_2_0283E34B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02814005 |
13_2_02814005 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0283706A |
13_2_0283706A |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0281F18B |
13_2_0281F18B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_028541D9 |
13_2_028541D9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_028381E8 |
13_2_028381E8 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0283E11C |
13_2_0283E11C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_028387F0 |
13_2_028387F0 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0282742E |
13_2_0282742E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0283E5A8 |
13_2_0283E5A8 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02837566 |
13_2_02837566 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02827AD7 |
13_2_02827AD7 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0284DA49 |
13_2_0284DA49 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0281DBF3 |
13_2_0281DBF3 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_028339D7 |
13_2_028339D7 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0283797E |
13_2_0283797E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02826E9F |
13_2_02826E9F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02835EEB |
13_2_02835EEB |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0283DEED |
13_2_0283DEED |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02827C40 |
13_2_02827C40 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02837DB3 |
13_2_02837DB3 |
Source: 13.2.SndVol.exe.2800000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 13.2.SndVol.exe.2800000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 13.2.SndVol.exe.2800000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 13.2.SndVol.exe.2800000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 13.2.SndVol.exe.2800000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 13.2.SndVol.exe.2800000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.colorcpl.exe.27c0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.colorcpl.exe.27c0000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.D2pQ4J4GGZ.exe.29c0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.D2pQ4J4GGZ.exe.29c0000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000D.00000002.2322085295.0000000002800000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000D.00000002.2322085295.0000000002800000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000D.00000002.2322085295.0000000002800000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000B.00000002.2240919016.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000B.00000002.2240919016.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000B.00000002.2240919016.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.2170737614.000000007EAA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000000.00000002.2150744964.0000000002A47000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000008.00000002.4491421481.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000008.00000002.4491421481.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000002.4491421481.00000000027C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: D2pQ4J4GGZ.exe PID: 6804, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 5804, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 2964, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: SndVol.exe PID: 6608, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: winhttpcom.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??????????.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??????????.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??????????.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: tquery.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: cryptdll.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppwmi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppcext.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: winscard.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: esent.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: esent.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: esent.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: colorui.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mscms.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coloradapterclient.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: tquery.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: cryptdll.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppwmi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppcext.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winscard.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: colorui.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mscms.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coloradapterclient.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: tquery.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: cryptdll.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppwmi.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppcext.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: winscard.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: 0_2_029C5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, |
0_2_029C5908 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
8_2_027C928E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027DC322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, |
8_2_027DC322 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027CC388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, |
8_2_027CC388 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C96A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
8_2_027C96A0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027CBB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
8_2_027CBB6B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027D9B86 FindFirstFileW,FindNextFileW,FindNextFileW, |
8_2_027D9B86 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C7877 FindFirstFileW,FindNextFileW, |
8_2_027C7877 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027C8847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, |
8_2_027C8847 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_0280E8F9 FindFirstFileExA, |
8_2_0280E8F9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_027CBD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
8_2_027CBD72 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
11_2_027C928E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027DC322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, |
11_2_027DC322 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027CC388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, |
11_2_027CC388 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C96A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
11_2_027C96A0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027CBB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
11_2_027CBB6B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027D9B86 FindFirstFileW,FindNextFileW,FindNextFileW, |
11_2_027D9B86 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C7877 FindFirstFileW,FindNextFileW, |
11_2_027C7877 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027C8847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, |
11_2_027C8847 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_0280E8F9 FindFirstFileExA, |
11_2_0280E8F9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 11_2_027CBD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
11_2_027CBD72 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
13_2_0280928E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, |
13_2_0280C388 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0281C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, |
13_2_0281C322 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_028096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
13_2_028096A0 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02819B86 FindFirstFileW,FindNextFileW,FindNextFileW, |
13_2_02819B86 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
13_2_0280BB6B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0284E8F9 FindFirstFileExA, |
13_2_0284E8F9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02808847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, |
13_2_02808847 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_02807877 FindFirstFileW,FindNextFileW, |
13_2_02807877 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 13_2_0280BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
13_2_0280BD72 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, |
0_2_029C5ACC |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: GetLocaleInfoA, |
0_2_029CA7C4 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: GetLocaleInfoA, |
0_2_029CA810 |
Source: C:\Users\user\Desktop\D2pQ4J4GGZ.exe |
Code function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, |
0_2_029C5BD8 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoA, |
8_2_027CF90C |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW, |
8_2_02812393 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
8_2_028120B6 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
8_2_0281201B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
8_2_02812143 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
8_2_02812690 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
8_2_02808484 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
8_2_028124BC |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW, |
8_2_028125C3 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW, |
8_2_0280896D |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
8_2_02811FD0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
8_2_02811D58 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW, |
11_2_02812393 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
11_2_028120B6 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
11_2_0281201B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
11_2_02812143 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
11_2_02812690 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
11_2_02808484 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
11_2_028124BC |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW, |
11_2_028125C3 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoA, |
11_2_027CF90C |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: GetLocaleInfoW, |
11_2_0280896D |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: EnumSystemLocalesW, |
11_2_02811FD0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
11_2_02811D58 |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, |
12_2_029A5ACC |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, |
12_2_029A5BD7 |
Source: C:\Users\Public\Libraries\Vjrsafyh.PIF |
Code function: GetLocaleInfoA, |
12_2_029AA810 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
13_2_02852393 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
13_2_028520B6 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
13_2_0285201B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
13_2_02852143 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
13_2_02852690 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
13_2_02848484 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
13_2_028524BC |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
13_2_028525C3 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoA, |
13_2_0280F90C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: GetLocaleInfoW, |
13_2_0284896D |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: EnumSystemLocalesW, |
13_2_02851FD0 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
13_2_02851D58 |