Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B46CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00B46CA9 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B460DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 0_2_00B460DD |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B463F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 0_2_00B463F9 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B4EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00B4EB60 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B4F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_00B4F5FA |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B4F56F FindFirstFileW,FindClose, | 0_2_00B4F56F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B51B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00B51B2F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B51C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00B51C8A |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B51F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00B51F94 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BB6CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00BB6CA9 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 2_2_00BB60DD |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 2_2_00BB63F9 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BBEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00BBEB60 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BBF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_00BBF5FA |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BBF56F FindFirstFileW,FindClose, | 2_2_00BBF56F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00BC1B2F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00BC1C8A |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00BC1F94 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 3_2_0040B335 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 3_2_0041B42F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 3_2_0040B53A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044D5E9 FindFirstFileExA, | 3_2_0044D5E9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 3_2_004089A9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00406AC2 FindFirstFileW,FindNextFileW, | 3_2_00406AC2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 3_2_00407A8C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, | 3_2_00418C69 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 3_2_00408DA7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 3_2_100010F1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_10006580 FindFirstFileExA, | 3_2_10006580 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 8_2_0040B335 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 8_2_0041B42F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 8_2_0040B53A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0044D5E9 FindFirstFileExA, | 8_2_0044D5E9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 8_2_004089A9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00406AC2 FindFirstFileW,FindNextFileW, | 8_2_00406AC2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 8_2_00407A8C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, | 8_2_00418C69 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 8_2_00408DA7 |
Source: svchost.exe, 0000000C.00000003.1590545977.0000000002B44000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: {le://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.facebook.com (Facebook) |
Source: svchost.exe, 0000000C.00000003.1590545977.0000000002B44000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: {le://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.yahoo.com (Yahoo) |
Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: exp1.www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: exp2.www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: exp3.www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: exp4.www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: exp5.www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: realtime.www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: www.linkedin.com0 equals www.linkedin.com (Linkedin) |
Source: svchost.exe, 0000000C.00000003.1581687315.0000000002B3A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1581174240.0000000002B44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1582333402.0000000002B32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: {file://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.facebook.com (Facebook) |
Source: svchost.exe, 0000000C.00000003.1581687315.0000000002B3A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1581174240.0000000002B44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1582333402.0000000002B32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: {file://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.yahoo.com (Yahoo) |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook) |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo) |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: svchost.exe, 00000003.00000002.3825727194.000000000324C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/ |
Source: svchost.exe | String found in binary or memory: http://geoplugin.net/json.gp |
Source: schoollike.exe, 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, schoollike.exe, 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: svchost.exe, 00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpSystem32 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://ocsp.msocsp.com0S |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.ebuddy.com |
Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.com |
Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comr |
Source: svchost.exe, 0000000C.00000002.1590639389.0000000000174000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net |
Source: svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net/ |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DesusertionEndpoint=P |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5b& |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5c& |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://edd27623571fc427dc1f8d6ba04dd39f.clo.footprintdns.com/apc/trans.gif?b37f6b94dfddf29d58d90046 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: svchost.exe, 0000000C.00000002.1591389630.0000000002B00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/oauth20_logout.srfclient_iu# |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-09-10-14/PreSignInSettingsConfig.json |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=6c2de995c290b031854b |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=eafda5 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://rum18.perf.linkedin.com/apc/trans.gif?481b7caa9fdb7105b2103a8300811877 |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://rum18.perf.linkedin.com/apc/trans.gif?d99a5c14daed171e4daf3a2c1226bd16 |
Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: bhv6B95.tmp.12.dr | String found in binary or memory: https://www.office.com/ |
Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: This is a third-party compiled AutoIt script. | 0_2_00B03D19 |
Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000002.1374242912.0000000000BAE000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_e2950e05-1 |
Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000002.1374242912.0000000000BAE000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_df38d542-8 |
Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000003.1371420320.00000000039AD000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_0223b75d-c |
Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000003.1371420320.00000000039AD000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_fb7a09f1-4 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: This is a third-party compiled AutoIt script. | 2_2_00B73D19 |
Source: schoollike.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: schoollike.exe, 00000002.00000000.1371725260.0000000000C1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_30cb1e68-2 |
Source: schoollike.exe, 00000002.00000000.1371725260.0000000000C1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_3b7980e3-3 |
Source: schoollike.exe, 00000005.00000002.1490413720.0000000000C1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_8839cc64-b |
Source: schoollike.exe, 00000005.00000002.1490413720.0000000000C1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_ef8987e7-c |
Source: schoollike.exe, 00000007.00000002.1505619498.0000000000C1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_439b5e7d-d |
Source: schoollike.exe, 00000007.00000002.1505619498.0000000000C1E000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_f05db03c-d |
Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_468d4966-b |
Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_56713dca-b |
Source: schoollike.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_a84553d7-f |
Source: schoollike.exe.0.dr | String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_288ce56b-3 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B2B043 | 0_2_00B2B043 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B13200 | 0_2_00B13200 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B3410F | 0_2_00B3410F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B202A4 | 0_2_00B202A4 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B0E3B0 | 0_2_00B0E3B0 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B3038E | 0_2_00B3038E |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B206D9 | 0_2_00B206D9 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B3467F | 0_2_00B3467F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B6AACE | 0_2_00B6AACE |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B34BEF | 0_2_00B34BEF |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B2CCC1 | 0_2_00B2CCC1 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B06F07 | 0_2_00B06F07 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B0AF50 | 0_2_00B0AF50 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B631BC | 0_2_00B631BC |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B2D1B9 | 0_2_00B2D1B9 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B1B11F | 0_2_00B1B11F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B2123A | 0_2_00B2123A |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B3724D | 0_2_00B3724D |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B093F0 | 0_2_00B093F0 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B413CA | 0_2_00B413CA |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B1F563 | 0_2_00B1F563 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B096C0 | 0_2_00B096C0 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B4B6CC | 0_2_00B4B6CC |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B077B0 | 0_2_00B077B0 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B6F7FF | 0_2_00B6F7FF |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B379C9 | 0_2_00B379C9 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B1FA57 | 0_2_00B1FA57 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B13B70 | 0_2_00B13B70 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B09B60 | 0_2_00B09B60 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B07D19 | 0_2_00B07D19 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B29ED0 | 0_2_00B29ED0 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B1FE6F | 0_2_00B1FE6F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B07FA3 | 0_2_00B07FA3 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_012493A0 | 0_2_012493A0 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B9B043 | 2_2_00B9B043 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B83200 | 2_2_00B83200 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BA410F | 2_2_00BA410F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B902A4 | 2_2_00B902A4 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B7E3B0 | 2_2_00B7E3B0 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BA038E | 2_2_00BA038E |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B906D9 | 2_2_00B906D9 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BA467F | 2_2_00BA467F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDAACE | 2_2_00BDAACE |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BA4BEF | 2_2_00BA4BEF |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B9CCC1 | 2_2_00B9CCC1 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B76F07 | 2_2_00B76F07 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B7AF50 | 2_2_00B7AF50 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B9D1B9 | 2_2_00B9D1B9 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BD31BC | 2_2_00BD31BC |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B8B11F | 2_2_00B8B11F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B9123A | 2_2_00B9123A |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BA724D | 2_2_00BA724D |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B793F0 | 2_2_00B793F0 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BB13CA | 2_2_00BB13CA |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B8F563 | 2_2_00B8F563 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B796C0 | 2_2_00B796C0 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BBB6CC | 2_2_00BBB6CC |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B777B0 | 2_2_00B777B0 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDF7FF | 2_2_00BDF7FF |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BA79C9 | 2_2_00BA79C9 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B8FA57 | 2_2_00B8FA57 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B83B70 | 2_2_00B83B70 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B79B60 | 2_2_00B79B60 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B77D19 | 2_2_00B77D19 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B99ED0 | 2_2_00B99ED0 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B8FE6F | 2_2_00B8FE6F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B77FA3 | 2_2_00B77FA3 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00D1A5E8 | 2_2_00D1A5E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041D071 | 3_2_0041D071 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004520D2 | 3_2_004520D2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043D098 | 3_2_0043D098 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00437150 | 3_2_00437150 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004361AA | 3_2_004361AA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00426254 | 3_2_00426254 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00431377 | 3_2_00431377 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043651C | 3_2_0043651C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041E5DF | 3_2_0041E5DF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044C739 | 3_2_0044C739 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004367C6 | 3_2_004367C6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004267CB | 3_2_004267CB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043C9DD | 3_2_0043C9DD |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00432A49 | 3_2_00432A49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00436A8D | 3_2_00436A8D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043CC0C | 3_2_0043CC0C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00436D48 | 3_2_00436D48 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00434D22 | 3_2_00434D22 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00426E73 | 3_2_00426E73 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00440E20 | 3_2_00440E20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043CE3B | 3_2_0043CE3B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00412F45 | 3_2_00412F45 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00452F00 | 3_2_00452F00 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00426FAD | 3_2_00426FAD |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_10017194 | 3_2_10017194 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_1000B5C1 | 3_2_1000B5C1 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 5_2_015D35F8 | 5_2_015D35F8 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 7_2_00D53C30 | 7_2_00D53C30 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041D071 | 8_2_0041D071 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004520D2 | 8_2_004520D2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043D098 | 8_2_0043D098 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00437150 | 8_2_00437150 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004361AA | 8_2_004361AA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00426254 | 8_2_00426254 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00431377 | 8_2_00431377 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043651C | 8_2_0043651C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041E5DF | 8_2_0041E5DF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0044C739 | 8_2_0044C739 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004367C6 | 8_2_004367C6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004267CB | 8_2_004267CB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043C9DD | 8_2_0043C9DD |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00432A49 | 8_2_00432A49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00436A8D | 8_2_00436A8D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043CC0C | 8_2_0043CC0C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00436D48 | 8_2_00436D48 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00434D22 | 8_2_00434D22 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00426E73 | 8_2_00426E73 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00440E20 | 8_2_00440E20 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043CE3B | 8_2_0043CE3B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00412F45 | 8_2_00412F45 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00452F00 | 8_2_00452F00 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00426FAD | 8_2_00426FAD |
Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.3830651470.0000000006600000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.1570199633.0000000000400000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: svchost.exe, 0000000C.00000003.1590523594.0000000002B2E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1590454839.0000000002B2E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: unknown | Process created: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" | |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Process created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" | |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq" | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq" | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\wnsiqxnvuzqluislmugbiidvdjfejiom" | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ypxsq" | |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Process created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq" | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq" | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\wnsiqxnvuzqluislmugbiidvdjfejiom" | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ypxsq" | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B26B05 push ecx; ret | 0_2_00B26B18 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDC295 push ss; ret | 2_2_00BDC29D |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDC2CE push ss; ret | 2_2_00BDC2D6 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDC230 push ss; ret | 2_2_00BDC231 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDC26B push ss; ret | 2_2_00BDC26D |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B96B05 push ecx; ret | 2_2_00B96B18 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBDFE push ss; ret | 2_2_00BDBE00 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBDEA push ss; ret | 2_2_00BDBDEB |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBD75 push ss; ret | 2_2_00BDBD7A |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBD69 push ss; ret | 2_2_00BDBD6A |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBD52 push ss; ret | 2_2_00BDBD53 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBE1E push ss; ret | 2_2_00BDBE26 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBFDD push ss; ret | 2_2_00BDBFDF |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBF30 push ss; ret | 2_2_00BDBF32 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBF73 push ss; ret | 2_2_00BDBF7B |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBF55 push ss; ret | 2_2_00BDBF57 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BDBF45 push ss; ret | 2_2_00BDBF46 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004567E0 push eax; ret | 3_2_004567FE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0045B9DD push esi; ret | 3_2_0045B9E6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00463EF3 push ds; retf | 3_2_00463EEC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00455EAF push ecx; ret | 3_2_00455EC2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00433FF6 push ecx; ret | 3_2_00434009 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_10002806 push ecx; ret | 3_2_10002819 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 5_2_015D3815 push edi; retf | 5_2_015D3820 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 7_2_00D53E4D push edi; retf | 7_2_00D53E58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004567E0 push eax; ret | 8_2_004567FE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0045B9DD push esi; ret | 8_2_0045B9E6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00463EF3 push ds; retf | 8_2_00463EEC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00455EAF push ecx; ret | 8_2_00455EC2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00433FF6 push ecx; ret | 8_2_00434009 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B46CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_00B46CA9 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B460DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 0_2_00B460DD |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B463F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 0_2_00B463F9 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B4EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00B4EB60 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B4F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_00B4F5FA |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B4F56F FindFirstFileW,FindClose, | 0_2_00B4F56F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B51B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00B51B2F |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B51C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00B51C8A |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B51F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_00B51F94 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BB6CA9 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00BB6CA9 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, | 2_2_00BB60DD |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, | 2_2_00BB63F9 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BBEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00BBEB60 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BBF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_00BBF5FA |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BBF56F FindFirstFileW,FindClose, | 2_2_00BBF56F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00BC1B2F |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00BC1C8A |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00BC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00BC1F94 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 3_2_0040B335 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 3_2_0041B42F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 3_2_0040B53A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044D5E9 FindFirstFileExA, | 3_2_0044D5E9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 3_2_004089A9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00406AC2 FindFirstFileW,FindNextFileW, | 3_2_00406AC2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 3_2_00407A8C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, | 3_2_00418C69 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 3_2_00408DA7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 3_2_100010F1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_10006580 FindFirstFileExA, | 3_2_10006580 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 8_2_0040B335 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 8_2_0041B42F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 8_2_0040B53A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0044D5E9 FindFirstFileExA, | 8_2_0044D5E9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 8_2_004089A9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00406AC2 FindFirstFileW,FindNextFileW, | 8_2_00406AC2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 8_2_00407A8C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, | 8_2_00418C69 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 8_2_00408DA7 |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B281AC SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00B281AC |
Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe | Code function: 0_2_00B28189 SetUnhandledExceptionFilter, | 0_2_00B28189 |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B981AC SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_00B981AC |
Source: C:\Users\user\AppData\Local\penstocks\schoollike.exe | Code function: 2_2_00B98189 SetUnhandledExceptionFilter, | 2_2_00B98189 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_00434168 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_0043A65D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00433B44 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00433CD7 SetUnhandledExceptionFilter, | 3_2_00433CD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_100060E2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_10002639 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_10002B1C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 8_2_00434168 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 8_2_0043A65D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 8_2_00433B44 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00433CD7 SetUnhandledExceptionFilter, | 8_2_00433CD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 3_2_0040E679 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_004470AE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_004510BA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 3_2_004511E3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_004512EA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 3_2_004513B7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_00447597 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 3_2_00450A7F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_00450CF7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_00450D42 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_00450DDD |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 3_2_00450E6A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_004470AE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 8_2_004510BA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 8_2_004511E3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 8_2_004512EA |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 8_2_004513B7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 8_2_00447597 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 8_2_0040E679 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 8_2_00450A7F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_00450CF7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_00450D42 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_00450DDD |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 8_2_00450E6A |