Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_0297534C GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, | 0_2_0297534C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 5_2_0040B335 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 5_2_0040B53A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 5_2_0041B63A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 5_2_004089A9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00406AC2 FindFirstFileW,FindNextFileW, | 5_2_00406AC2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 5_2_00407A8C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 5_2_00408DA7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW, | 5_2_00418E5F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0716C3BF FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 5_2_0716C3BF |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0715C2BF FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 5_2_0715C2BF |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0715C0BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 5_2_0715C0BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07158811 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 5_2_07158811 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0715972E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 5_2_0715972E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07159B2C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 5_2_07159B2C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07169BE4 FindFirstFileW, | 5_2_07169BE4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07157847 FindFirstFileW,FindNextFileW, | 5_2_07157847 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_052910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 5_2_052910F1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0040AE51 FindFirstFileW,FindNextFileW, | 7_2_0040AE51 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen, | 8_2_00407EF8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen, | 9_2_00407898 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 11_2_0040B335 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 11_2_0040B53A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 11_2_0041B63A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 11_2_004089A9 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00406AC2 FindFirstFileW,FindNextFileW, | 11_2_00406AC2 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 11_2_00407A8C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 11_2_00408DA7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW, | 11_2_00418E5F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ACC0BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 11_2_04ACC0BA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ACC2BF FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 11_2_04ACC2BF |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ADC3BF FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 11_2_04ADC3BF |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC8811 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 11_2_04AC8811 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC972E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 11_2_04AC972E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC7847 FindFirstFileW,FindNextFileW, | 11_2_04AC7847 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AD9BE4 FindFirstFileW, | 11_2_04AD9BE4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC9B2C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 11_2_04AC9B2C |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0? |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0= |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~ |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0 |
Source: colorcpl.exe, 00000005.00000003.1717700032.0000000003064000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1714653918.0000000003064000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1719040592.0000000003064000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1720924755.0000000003064000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1721215104.0000000003064000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1721716564.0000000003064000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/V |
Source: colorcpl.exe, 00000005.00000003.1747361234.0000000003021000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1721215104.000000000305E000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000002.4145914838.000000000305E000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1717832744.000000000305C000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe | String found in binary or memory: http://geoplugin.net/json.gp |
Source: colorcpl.exe, 00000005.00000002.4146895773.0000000007150000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000002.4140858643.0000000000400000.00000040.00001000.00020000.00000000.sdmp, SndVol.exe, 0000000B.00000002.1812493335.0000000004AC0000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000000B.00000002.1811552220.0000000000400000.00000040.00001000.00020000.00000000.sdmp, SndVol.exe, 0000000E.00000002.1896020251.0000000004BC0000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000000E.00000002.1894763646.0000000000400000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: colorcpl.exe, 00000005.00000002.4143664674.0000000002FD4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp? |
Source: colorcpl.exe, 00000005.00000003.1717700032.0000000003021000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1721716564.0000000003030000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1714509144.0000000003031000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1720924755.0000000003030000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpJ |
Source: colorcpl.exe, 00000005.00000002.4143664674.0000000002FD4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpQ |
Source: colorcpl.exe, 00000005.00000003.1717700032.0000000003021000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000002.4145546656.000000000302F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1721716564.0000000003030000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1714509144.0000000003031000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1720924755.0000000003030000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1747361234.0000000003021000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpSystem32 |
Source: colorcpl.exe, 00000005.00000002.4143664674.0000000002FD4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpT |
Source: colorcpl.exe, 00000005.00000003.1717700032.0000000003021000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1721716564.0000000003030000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1714509144.0000000003031000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1720924755.0000000003030000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpl |
Source: colorcpl.exe, 00000005.00000003.1717700032.0000000003021000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000002.4145546656.000000000302F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1721716564.0000000003030000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1714509144.0000000003031000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1720924755.0000000003030000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000005.00000003.1747361234.0000000003021000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpr |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocsp.digicert.com0Q |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocsp.msocsp.com0S |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://ocspx.digicert.com0E |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: colorcpl.exe, colorcpl.exe, 00000009.00000002.1727076537.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.ebuddy.com |
Source: colorcpl.exe, colorcpl.exe, 00000009.00000002.1727740365.0000000000D5D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.1727076537.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.com |
Source: colorcpl.exe, 00000005.00000002.4146646241.0000000005260000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000002.1727076537.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: colorcpl.exe, 00000005.00000002.4146646241.0000000005260000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000002.1727076537.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comr |
Source: colorcpl.exe, 00000009.00000002.1727740365.0000000000D5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.comta |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696334965379 |
Source: colorcpl.exe, 00000007.00000002.1745441308.0000000000A34000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net |
Source: colorcpl.exe, 00000009.00000002.1727076537.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net/ |
Source: IRSTaxRefund.exe, 00000000.00000002.1741661236.000000007ED9F000.00000004.00001000.00020000.00000000.sdmp, IRSTaxRefund.exe, 00000000.00000002.1716729044.0000000020839000.00000004.00001000.00020000.00000000.sdmp, IRSTaxRefund.exe, 00000000.00000003.1671698705.000000007F0EC000.00000004.00001000.00020000.00000000.sdmp, IRSTaxRefund.exe, 00000000.00000003.1671698705.000000007F073000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.pmail.com |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?99bdaa7641aea1439604d0afe8971477 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?bc7d158a1b0c0bcddb88a222b6122bda |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?4be9f57fdbd89d63c136fa90032d1d91 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?e5772e13592c9d33c9159aed24f891a7 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?a6aceac28fb5ae421a73cab7cdd76bd8 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?b57fe5cd49060a950d25a1d237496815 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?2f6c563d6db8702d4f61cfc28e14d6ba |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?3dacce210479f0b4d47ed33c21160712 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?7e0e9c3a9f02f17275e789accf11532b |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?81f59f7d566abbd2077a5b6cdfd04c7b |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?3c5bdbf226e2549812723f51b8fe2023 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?c50299ad5b45bb3d4c7a57024998a291 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: colorcpl.exe, 00000007.00000003.1744514210.000000000304D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.liv |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae |
Source: colorcpl.exe | String found in binary or memory: https://login.yahoo.com/config/login |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_sKiljltKC1Ne_Y3fl1HuHQ2.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_BxKM4IRLudkIao5qo |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_AI1nyU_u3YQ_at1fSBm4Uw2.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://maps.windows.com/windows-app-web-link |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=27ff908e89d7b6264fde |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=586ba6 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=7ccb04 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=b1ed69 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59 |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: colorcpl.exe, colorcpl.exe, 00000009.00000002.1727076537.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: colorcpl.exe | String found in binary or memory: https://www.google.com/accounts/servicelogin |
Source: bhv6B80.tmp.7.dr | String found in binary or memory: https://www.office.com/ |
Source: 11.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.SndVol.exe.4ac1985.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.SndVol.exe.4ac1985.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.SndVol.exe.4ac1985.2.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 14.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 14.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 14.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 14.2.SndVol.exe.4bc1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 14.2.SndVol.exe.4bc1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 14.2.SndVol.exe.4bc1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.SndVol.exe.4ac0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.SndVol.exe.4ac0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.SndVol.exe.4ac0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.SndVol.exe.4ac0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.SndVol.exe.4ac0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.SndVol.exe.4ac0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 14.2.SndVol.exe.4bc0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 14.2.SndVol.exe.4bc0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 14.2.SndVol.exe.4bc0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.colorcpl.exe.7151985.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.colorcpl.exe.7151985.4.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.colorcpl.exe.7151985.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 14.2.SndVol.exe.4bc0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 14.2.SndVol.exe.4bc0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 14.2.SndVol.exe.4bc0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 14.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 14.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 14.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.colorcpl.exe.7150000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.colorcpl.exe.7150000.3.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.colorcpl.exe.7150000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.colorcpl.exe.7150000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.colorcpl.exe.7150000.3.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.colorcpl.exe.7150000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 14.2.SndVol.exe.4bc1985.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 14.2.SndVol.exe.4bc1985.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 14.2.SndVol.exe.4bc1985.2.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.colorcpl.exe.7151985.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.colorcpl.exe.7151985.4.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.colorcpl.exe.7151985.4.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 11.2.SndVol.exe.4ac1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 11.2.SndVol.exe.4ac1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 11.2.SndVol.exe.4ac1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000B.00000002.1812493335.0000000004AC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000B.00000002.1812493335.0000000004AC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000B.00000002.1812493335.0000000004AC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000E.00000002.1896020251.0000000004BC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000E.00000002.1896020251.0000000004BC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000E.00000002.1896020251.0000000004BC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000005.00000002.4146895773.0000000007150000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.4146895773.0000000007150000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000005.00000002.4146895773.0000000007150000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000B.00000002.1811552220.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000B.00000002.1811552220.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000B.00000002.1811552220.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000E.00000002.1894763646.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000E.00000002.1894763646.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000000E.00000002.1894763646.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000005.00000002.4140858643.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.4140858643.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000005.00000002.4140858643.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: colorcpl.exe PID: 7472, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: SndVol.exe PID: 7784, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: SndVol.exe PID: 8036, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_029833F8 NtWriteVirtualMemory, | 0_2_029833F8 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_029830AC NtAllocateVirtualMemory, | 0_2_029830AC |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_029896E4 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, | 0_2_029896E4 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_02989600 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, | 0_2_02989600 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_02989578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 0_2_02989578 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_02986A8C GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, | 0_2_02986A8C |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_029842A8 GetThreadContext,SetThreadContext,NtResumeThread, | 0_2_029842A8 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_029842A6 GetThreadContext,SetThreadContext,NtResumeThread, | 0_2_029842A6 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_029830AA NtAllocateVirtualMemory, | 0_2_029830AA |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_02989524 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 0_2_02989524 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_02983A14 NtProtectVirtualMemory, | 0_2_02983A14 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041742B GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError, | 5_2_0041742B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041AECC OpenProcess,NtSuspendProcess,CloseHandle, | 5_2_0041AECC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041AEF8 OpenProcess,NtResumeProcess,CloseHandle, | 5_2_0041AEF8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_071681B0 CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError, | 5_2_071681B0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0716BC51 OpenProcess,NtSuspendProcess,CloseHandle, | 5_2_0716BC51 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0716BC7D OpenProcess,NtResumeProcess,CloseHandle, | 5_2_0716BC7D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0716DA2E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, | 5_2_0716DA2E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle, | 7_2_0040DD85 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00401806 NtdllDefWindowProc_W, | 7_2_00401806 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_004018C0 NtdllDefWindowProc_W, | 7_2_004018C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_004016FD NtdllDefWindowProc_A, | 8_2_004016FD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_004017B7 NtdllDefWindowProc_A, | 8_2_004017B7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00402CAC NtdllDefWindowProc_A, | 9_2_00402CAC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00402D66 NtdllDefWindowProc_A, | 9_2_00402D66 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC6A8C GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, | 10_2_02AC6A8C |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC33F8 NtWriteVirtualMemory, | 10_2_02AC33F8 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC30AC NtAllocateVirtualMemory, | 10_2_02AC30AC |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC96E4 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose, | 10_2_02AC96E4 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC3AAC NtProtectVirtualMemory, | 10_2_02AC3AAC |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC42A8 Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, | 10_2_02AC42A8 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC42A6 Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, | 10_2_02AC42A6 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC3A14 NtProtectVirtualMemory, | 10_2_02AC3A14 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC30AA NtAllocateVirtualMemory, | 10_2_02AC30AA |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC9600 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, | 10_2_02AC9600 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC3493 NtWriteVirtualMemory, | 10_2_02AC3493 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC9524 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 10_2_02AC9524 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AC9578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 10_2_02AC9578 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ADDA2E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, | 11_2_04ADDA2E |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_029720B4 | 0_2_029720B4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0043D04B | 5_2_0043D04B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0042707E | 5_2_0042707E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041301D | 5_2_0041301D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00441030 | 5_2_00441030 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00453110 | 5_2_00453110 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_004271B8 | 5_2_004271B8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041D27C | 5_2_0041D27C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_004522E2 | 5_2_004522E2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0043D2A8 | 5_2_0043D2A8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00437360 | 5_2_00437360 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_004363BA | 5_2_004363BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0042645F | 5_2_0042645F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00431582 | 5_2_00431582 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0043672C | 5_2_0043672C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041E7EA | 5_2_0041E7EA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0044C949 | 5_2_0044C949 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_004269D6 | 5_2_004269D6 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_004369D6 | 5_2_004369D6 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0043CBED | 5_2_0043CBED |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00432C54 | 5_2_00432C54 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00436C9D | 5_2_00436C9D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0043CE1C | 5_2_0043CE1C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00436F58 | 5_2_00436F58 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00434F32 | 5_2_00434F32 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07182307 | 5_2_07182307 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0716E001 | 5_2_0716E001 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0718E02D | 5_2_0718E02D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_071880E5 | 5_2_071880E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0718775B | 5_2_0718775B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0717775B | 5_2_0717775B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0719D6CE | 5_2_0719D6CE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0716F56F | 5_2_0716F56F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_071874B1 | 5_2_071874B1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0718713F | 5_2_0718713F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_071771E4 | 5_2_071771E4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_071A3067 | 5_2_071A3067 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07177F3D | 5_2_07177F3D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07177E03 | 5_2_07177E03 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07191DB5 | 5_2_07191DB5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07163DA2 | 5_2_07163DA2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0718DDD0 | 5_2_0718DDD0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07185CB7 | 5_2_07185CB7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07187CDD | 5_2_07187CDD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0718DBA1 | 5_2_0718DBA1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07187A22 | 5_2_07187A22 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0718D972 | 5_2_0718D972 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_071839D9 | 5_2_071839D9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0529B5C1 | 5_2_0529B5C1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_052A7194 | 5_2_052A7194 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044B040 | 7_2_0044B040 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0043610D | 7_2_0043610D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00447310 | 7_2_00447310 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044A490 | 7_2_0044A490 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0040755A | 7_2_0040755A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0043C560 | 7_2_0043C560 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044B610 | 7_2_0044B610 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044D6C0 | 7_2_0044D6C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_004476F0 | 7_2_004476F0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044B870 | 7_2_0044B870 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044081D | 7_2_0044081D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00414957 | 7_2_00414957 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_004079EE | 7_2_004079EE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00407AEB | 7_2_00407AEB |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044AA80 | 7_2_0044AA80 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00412AA9 | 7_2_00412AA9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00404B74 | 7_2_00404B74 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00404B03 | 7_2_00404B03 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0044BBD8 | 7_2_0044BBD8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00404BE5 | 7_2_00404BE5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00404C76 | 7_2_00404C76 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00415CFE | 7_2_00415CFE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00416D72 | 7_2_00416D72 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00446D30 | 7_2_00446D30 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00446D8B | 7_2_00446D8B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_00406E8F | 7_2_00406E8F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00405038 | 8_2_00405038 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0041208C | 8_2_0041208C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_004050A9 | 8_2_004050A9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0040511A | 8_2_0040511A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0043C13A | 8_2_0043C13A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_004051AB | 8_2_004051AB |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00449300 | 8_2_00449300 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0040D322 | 8_2_0040D322 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0044A4F0 | 8_2_0044A4F0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0043A5AB | 8_2_0043A5AB |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00413631 | 8_2_00413631 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00446690 | 8_2_00446690 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0044A730 | 8_2_0044A730 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_004398D8 | 8_2_004398D8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_004498E0 | 8_2_004498E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0044A886 | 8_2_0044A886 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0043DA09 | 8_2_0043DA09 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00438D5E | 8_2_00438D5E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00449ED0 | 8_2_00449ED0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_0041FE83 | 8_2_0041FE83 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00430F54 | 8_2_00430F54 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_004050C2 | 9_2_004050C2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_004014AB | 9_2_004014AB |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00405133 | 9_2_00405133 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_004051A4 | 9_2_004051A4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00401246 | 9_2_00401246 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0040CA46 | 9_2_0040CA46 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00405235 | 9_2_00405235 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_004032C8 | 9_2_004032C8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00401689 | 9_2_00401689 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00402F60 | 9_2_00402F60 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: 10_2_02AB20B4 | 10_2_02AB20B4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0043D04B | 11_2_0043D04B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0042707E | 11_2_0042707E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0041301D | 11_2_0041301D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00441030 | 11_2_00441030 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00453110 | 11_2_00453110 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_004271B8 | 11_2_004271B8 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0041D27C | 11_2_0041D27C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_004522E2 | 11_2_004522E2 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0043D2A8 | 11_2_0043D2A8 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00437360 | 11_2_00437360 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_004363BA | 11_2_004363BA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0042645F | 11_2_0042645F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00431582 | 11_2_00431582 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0043672C | 11_2_0043672C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0041E7EA | 11_2_0041E7EA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0044C949 | 11_2_0044C949 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_004269D6 | 11_2_004269D6 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_004369D6 | 11_2_004369D6 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0043CBED | 11_2_0043CBED |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00432C54 | 11_2_00432C54 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00436C9D | 11_2_00436C9D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0043CE1C | 11_2_0043CE1C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00436F58 | 11_2_00436F58 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00434F32 | 11_2_00434F32 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF80E5 | 11_2_04AF80E5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AFE02D | 11_2_04AFE02D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ADE001 | 11_2_04ADE001 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF2307 | 11_2_04AF2307 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF74B1 | 11_2_04AF74B1 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ADF56F | 11_2_04ADF56F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04B0D6CE | 11_2_04B0D6CE |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF775B | 11_2_04AF775B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AE775B | 11_2_04AE775B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04B13067 | 11_2_04B13067 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AE71E4 | 11_2_04AE71E4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF713F | 11_2_04AF713F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF5CB7 | 11_2_04AF5CB7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF7CDD | 11_2_04AF7CDD |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04B01DB5 | 11_2_04B01DB5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AD3DA2 | 11_2_04AD3DA2 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AFDDD0 | 11_2_04AFDDD0 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AE7E03 | 11_2_04AE7E03 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AE7F3D | 11_2_04AE7F3D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF39D9 | 11_2_04AF39D9 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AFD972 | 11_2_04AFD972 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AF7A22 | 11_2_04AF7A22 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AFDBA1 | 11_2_04AFDBA1 |
Source: 11.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.SndVol.exe.4ac1985.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.SndVol.exe.4ac1985.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.SndVol.exe.4ac1985.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 14.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 14.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 14.2.SndVol.exe.4bc1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 14.2.SndVol.exe.4bc1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.SndVol.exe.4bc1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.SndVol.exe.4ac0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.SndVol.exe.4ac0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.SndVol.exe.4ac0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.SndVol.exe.4ac0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.SndVol.exe.4ac0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.SndVol.exe.4ac0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 14.2.SndVol.exe.4bc0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 14.2.SndVol.exe.4bc0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.SndVol.exe.4bc0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.colorcpl.exe.7151985.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.colorcpl.exe.7151985.4.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.colorcpl.exe.7151985.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 14.2.SndVol.exe.4bc0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 14.2.SndVol.exe.4bc0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.SndVol.exe.4bc0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 14.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 14.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.colorcpl.exe.7150000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.colorcpl.exe.7150000.3.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.colorcpl.exe.7150000.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.colorcpl.exe.7150000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.colorcpl.exe.7150000.3.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.colorcpl.exe.7150000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 14.2.SndVol.exe.4bc1985.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 14.2.SndVol.exe.4bc1985.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.SndVol.exe.4bc1985.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.colorcpl.exe.7151985.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.colorcpl.exe.7151985.4.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.colorcpl.exe.7151985.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 11.2.SndVol.exe.4ac1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 11.2.SndVol.exe.4ac1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 11.2.SndVol.exe.4ac1985.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000B.00000002.1812493335.0000000004AC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000B.00000002.1812493335.0000000004AC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000B.00000002.1812493335.0000000004AC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000E.00000002.1896020251.0000000004BC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000E.00000002.1896020251.0000000004BC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000E.00000002.1896020251.0000000004BC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000005.00000002.4146895773.0000000007150000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.4146895773.0000000007150000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000005.00000002.4146895773.0000000007150000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000B.00000002.1811552220.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000B.00000002.1811552220.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000B.00000002.1811552220.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000E.00000002.1894763646.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0000000E.00000002.1894763646.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000E.00000002.1894763646.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000005.00000002.4140858643.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.4140858643.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000005.00000002.4140858643.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: colorcpl.exe PID: 7472, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: SndVol.exe PID: 7784, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: SndVol.exe PID: 8036, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: colorui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sti.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: mmdevapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: dwmapi.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: atlthunk.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: mmdevapi.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: devobj.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: windowscodecs.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: winmm.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: 0_2_0297534C GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, | 0_2_0297534C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 5_2_0040B335 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 5_2_0040B53A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 5_2_0041B63A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 5_2_004089A9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00406AC2 FindFirstFileW,FindNextFileW, | 5_2_00406AC2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 5_2_00407A8C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 5_2_00408DA7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW, | 5_2_00418E5F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0716C3BF FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 5_2_0716C3BF |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0715C2BF FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 5_2_0715C2BF |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0715C0BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 5_2_0715C0BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07158811 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 5_2_07158811 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_0715972E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 5_2_0715972E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07159B2C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 5_2_07159B2C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07169BE4 FindFirstFileW, | 5_2_07169BE4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_07157847 FindFirstFileW,FindNextFileW, | 5_2_07157847 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 5_2_052910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 5_2_052910F1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 7_2_0040AE51 FindFirstFileW,FindNextFileW, | 7_2_0040AE51 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 8_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen, | 8_2_00407EF8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen, | 9_2_00407898 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 11_2_0040B335 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 11_2_0040B53A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 11_2_0041B63A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 11_2_004089A9 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00406AC2 FindFirstFileW,FindNextFileW, | 11_2_00406AC2 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 11_2_00407A8C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 11_2_00408DA7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW, | 11_2_00418E5F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ACC0BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 11_2_04ACC0BA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ACC2BF FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 11_2_04ACC2BF |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04ADC3BF FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 11_2_04ADC3BF |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC8811 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 11_2_04AC8811 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC972E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 11_2_04AC972E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC7847 FindFirstFileW,FindNextFileW, | 11_2_04AC7847 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AD9BE4 FindFirstFileW, | 11_2_04AD9BE4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 11_2_04AC9B2C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 11_2_04AC9B2C |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, | 0_2_02975510 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: GetLocaleInfoA, | 0_2_0297A130 |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: GetLocaleInfoA, | 0_2_0297A17C |
Source: C:\Users\user\Desktop\IRSTaxRefund.exe | Code function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, | 0_2_0297561C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 5_2_0045107A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 5_2_004512CA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_004472BE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 5_2_004513F3 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 5_2_004514FA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 5_2_004515C7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoA, | 5_2_0040E751 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 5_2_004477A7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 5_2_00450C8F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_00450F52 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_00450F07 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_00450FED |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 5_2_0719852C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 5_2_071A234C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 5_2_071A227F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 5_2_071A2178 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 5_2_071A204F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_07198043 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoA, | 5_2_0715F4D6 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_071A1D72 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 5_2_071A1DFF |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_071A1C8C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 5_2_071A1CD7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 5_2_071A1A14 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, | 10_2_02AB5510 |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: GetLocaleInfoA, | 10_2_02ABA17C |
Source: C:\Users\Public\Libraries\Tmohrqmb.PIF | Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, | 10_2_02AB561B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 11_2_0045107A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 11_2_004512CA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_004472BE |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 11_2_004513F3 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 11_2_004514FA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 11_2_004515C7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoA, | 11_2_0040E751 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 11_2_004477A7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 11_2_00450C8F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_00450F52 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_00450F07 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_00450FED |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 11_2_04B0852C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_04B08043 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 11_2_04B1204F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 11_2_04B12178 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 11_2_04B1227F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 11_2_04B1234C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoA, | 11_2_04ACF4D6 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_04B11C8C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_04B11CD7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 11_2_04B11DFF |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 11_2_04B11D72 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 11_2_04B11A14 |