Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_029352F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, | 4_2_029352F8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 6_2_004090DC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 6_2_0040B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 6_2_0041C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 6_2_0040B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0044E989 FindFirstFileExA, | 6_2_0044E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 6_2_00408CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 6_2_00419CEE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 6_2_00407EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00406F13 FindFirstFileW,FindNextFileW, | 6_2_00406F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0718C579 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 6_2_0718C579 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0718C374 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 6_2_0718C374 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_07188B9C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 6_2_07188B9C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719A9AD FindFirstFileW, | 6_2_0719A9AD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071CF648 FindFirstFileExA, | 6_2_071CF648 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719D4A4 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 6_2_0719D4A4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_07189D9B __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 6_2_07189D9B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_07187BD2 FindFirstFileW,FindNextFileW, | 6_2_07187BD2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0718999D __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 6_2_0718999D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_054910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 6_2_054910F1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_05496580 FindFirstFileExA, | 6_2_05496580 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 9_2_004090DC |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 9_2_0040B6B5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 9_2_0041C7E5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 9_2_0040B8BA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0044E989 FindFirstFileExA, | 9_2_0044E989 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 9_2_00408CDE |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 9_2_00419CEE |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 9_2_00407EDD |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00406F13 FindFirstFileW,FindNextFileW, | 9_2_00406F13 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0512C579 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 9_2_0512C579 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0512C374 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 9_2_0512C374 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0513A9AD FindFirstFileW, | 9_2_0513A9AD |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05128B9C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 9_2_05128B9C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0513D4A4 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 9_2_0513D4A4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0516F648 FindFirstFileExA, | 9_2_0516F648 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05129D9B __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 9_2_05129D9B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0512999D __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 9_2_0512999D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05127BD2 FindFirstFileW,FindNextFileW, | 9_2_05127BD2 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r3.crl0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0= |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0 |
Source: colorcpl.exe, 00000006.00000003.2520874945.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4752885939.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520445252.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2371060750.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.000000000342D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/ |
Source: colorcpl.exe, 00000006.00000003.2520874945.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4752885939.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520445252.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2371060750.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.000000000342D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/j |
Source: colorcpl.exe, colorcpl.exe, 00000006.00000003.2520874945.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2371060750.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4752638021.00000000033E4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521351534.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4752885939.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520874945.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520445252.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.0000000003405000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520445252.0000000003412000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.0000000003405000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2371060750.000000000342D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4752885939.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.000000000342D000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, bhv8238.tmp.13.dr | String found in binary or memory: http://geoplugin.net/json.gp |
Source: colorcpl.exe, 00000006.00000002.4755736828.0000000007180000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4749337631.0000000000400000.00000040.00001000.00020000.00000000.sdmp, SndVol.exe, 00000009.00000002.2403852969.0000000005120000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 00000009.00000002.2403177094.0000000000400000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: colorcpl.exe, 00000006.00000003.2371060750.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521351534.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520874945.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.0000000003405000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520445252.0000000003412000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.0000000003405000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4752885939.0000000003415000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpLZ |
Source: colorcpl.exe, 00000006.00000003.2371060750.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.0000000003405000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.0000000003405000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpN |
Source: colorcpl.exe, 00000006.00000003.2371060750.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.0000000003405000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp_ |
Source: colorcpl.exe, 00000006.00000003.2371060750.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.0000000003405000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.0000000003405000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpa |
Source: colorcpl.exe, 00000006.00000003.2371060750.0000000003415000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464561625.0000000003405000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2497991322.0000000003405000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpal |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://ocsp.digicert.com0Q |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://ocsp.msocsp.com0S |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://s1.symcb.com/pca3-g5.crl0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://s2.symcb.com0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://sf.symcb.com/sf.crl0a |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://sf.symcb.com/sf.crt0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://sf.symcd.com0& |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcb.com/sv.crl0a |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcb.com/sv.crt0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcd.com0& |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.360.cn |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: colorcpl.exe, 00000006.00000002.4755424256.0000000005460000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000F.00000002.2502369504.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.ebuddy.com |
Source: colorcpl.exe, 00000006.00000002.4755424256.0000000005460000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000F.00000002.2502369504.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 0000000F.00000003.2502064831.000000000389D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000F.00000003.2502110970.000000000389D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.com |
Source: colorcpl.exe, 00000006.00000002.4755424256.0000000005460000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000F.00000002.2502369504.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: recover.exe, 0000000F.00000003.2502064831.000000000389D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000F.00000003.2502110970.000000000389D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.compData |
Source: colorcpl.exe, 00000006.00000002.4755424256.0000000005460000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000F.00000002.2502369504.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comr |
Source: recover.exe, 0000000D.00000002.2516886927.0000000002994000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net |
Source: recover.exe, 0000000F.00000002.2502369504.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net/ |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.pmail.com |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.symauth.com/cps0( |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.symauth.com/rpa00 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://d.symcb.com/cps0% |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://d.symcb.com/rpa0 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c& |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/03 |
Source: x.exe, 00000004.00000003.2291500219.000000007EDE0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2323503161.000000002065A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2345869038.000000007ECEF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/06 |
Source: colorcpl.exe, 00000006.00000002.4755424256.0000000005460000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000F.00000002.2502369504.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: bhv8238.tmp.13.dr | String found in binary or memory: https://www.office.com/ |
Source: 6.2.colorcpl.exe.7180000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.colorcpl.exe.7180000.3.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.colorcpl.exe.7180000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.colorcpl.exe.71818bf.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.colorcpl.exe.71818bf.4.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.colorcpl.exe.71818bf.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 9.2.SndVol.exe.51218bf.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 9.2.SndVol.exe.51218bf.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 9.2.SndVol.exe.51218bf.2.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.colorcpl.exe.7180000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.colorcpl.exe.7180000.3.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.colorcpl.exe.7180000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 9.2.SndVol.exe.5120000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 9.2.SndVol.exe.5120000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 9.2.SndVol.exe.5120000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 9.2.SndVol.exe.5120000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 9.2.SndVol.exe.5120000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 9.2.SndVol.exe.5120000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.colorcpl.exe.71818bf.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.colorcpl.exe.71818bf.4.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.colorcpl.exe.71818bf.4.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 6.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 6.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 6.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 9.2.SndVol.exe.51218bf.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 9.2.SndVol.exe.51218bf.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 9.2.SndVol.exe.51218bf.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000009.00000002.2403852969.0000000005120000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000009.00000002.2403852969.0000000005120000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000009.00000002.2403852969.0000000005120000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000006.00000002.4749337631.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000006.00000002.4749337631.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000006.00000002.4749337631.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000009.00000002.2403177094.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000009.00000002.2403177094.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000009.00000002.2403177094.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000006.00000002.4755736828.0000000007180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000006.00000002.4755736828.0000000007180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000006.00000002.4755736828.0000000007180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: colorcpl.exe PID: 5640, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: SndVol.exe PID: 7036, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_02943380 NtWriteVirtualMemory, | 4_2_02943380 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_02943034 NtAllocateVirtualMemory, | 4_2_02943034 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_02949654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, | 4_2_02949654 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_02949738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, | 4_2_02949738 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_02946AE0 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, | 4_2_02946AE0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0294421C GetThreadContext,SetThreadContext,NtResumeThread, | 4_2_0294421C |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0294421A GetThreadContext,SetThreadContext,NtResumeThread, | 4_2_0294421A |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_02943032 NtAllocateVirtualMemory, | 4_2_02943032 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_029495CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 4_2_029495CC |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_02949578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 4_2_02949578 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0294399C NtProtectVirtualMemory, | 4_2_0294399C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00418267 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,GetLastError,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError, | 6_2_00418267 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0041C077 OpenProcess,NtSuspendProcess,CloseHandle, | 6_2_0041C077 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0041C0A3 OpenProcess,NtResumeProcess,CloseHandle, | 6_2_0041C0A3 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_07198F26 CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,GetLastError,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError, | 6_2_07198F26 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719CD36 OpenProcess,NtSuspendProcess,CloseHandle, | 6_2_0719CD36 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719CD62 OpenProcess,NtResumeProcess,CloseHandle, | 6_2_0719CD62 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719E987 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, | 6_2_0719E987 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02906AE0 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, | 8_2_02906AE0 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02903380 NtWriteVirtualMemory, | 8_2_02903380 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02903034 NtAllocateVirtualMemory, | 8_2_02903034 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02909738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, | 8_2_02909738 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_0290421A Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, | 8_2_0290421A |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_0290421C Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, | 8_2_0290421C |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02903A34 NtProtectVirtualMemory, | 8_2_02903A34 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02909809 NtQueryInformationFile,NtReadFile,NtClose, | 8_2_02909809 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02903032 NtAllocateVirtualMemory, | 8_2_02903032 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_0290399C NtProtectVirtualMemory, | 8_2_0290399C |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02909654 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, | 8_2_02909654 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_0290341B NtWriteVirtualMemory, | 8_2_0290341B |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_029095CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 8_2_029095CC |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_02909578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 8_2_02909578 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0513E987 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, | 9_2_0513E987 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_029320B4 | 4_2_029320B4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0042809D | 6_2_0042809D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0045412B | 6_2_0045412B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_004421C0 | 6_2_004421C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_004281D7 | 6_2_004281D7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0043E1E0 | 6_2_0043E1E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0041E29B | 6_2_0041E29B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_004373DA | 6_2_004373DA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00438380 | 6_2_00438380 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00453472 | 6_2_00453472 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0042747E | 6_2_0042747E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0043E43D | 6_2_0043E43D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_004325A1 | 6_2_004325A1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0041F809 | 6_2_0041F809 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_004279F5 | 6_2_004279F5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0044DAD9 | 6_2_0044DAD9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00433C73 | 6_2_00433C73 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00413CA0 | 6_2_00413CA0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0043DD82 | 6_2_0043DD82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00435F52 | 6_2_00435F52 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0043DFB1 | 6_2_0043DFB1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071CE798 | 6_2_071CE798 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071A86B4 | 6_2_071A86B4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071A04C8 | 6_2_071A04C8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071A813D | 6_2_071A813D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071D4131 | 6_2_071D4131 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071B8099 | 6_2_071B8099 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719EF5A | 6_2_0719EF5A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071C2E7F | 6_2_071C2E7F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071BEE9F | 6_2_071BEE9F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071A8E96 | 6_2_071A8E96 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071A8D5C | 6_2_071A8D5C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071D4DEA | 6_2_071D4DEA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071B6C11 | 6_2_071B6C11 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071BEC70 | 6_2_071BEC70 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071BEA41 | 6_2_071BEA41 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071B4932 | 6_2_071B4932 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719495F | 6_2_0719495F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071B3260 | 6_2_071B3260 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071B903F | 6_2_071B903F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071BF0FC | 6_2_071BF0FC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0549B5C1 | 6_2_0549B5C1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_054A7194 | 6_2_054A7194 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: 8_2_028F20B4 | 8_2_028F20B4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0042809D | 9_2_0042809D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0045412B | 9_2_0045412B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_004421C0 | 9_2_004421C0 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_004281D7 | 9_2_004281D7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0043E1E0 | 9_2_0043E1E0 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0041E29B | 9_2_0041E29B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_004373DA | 9_2_004373DA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00438380 | 9_2_00438380 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00453472 | 9_2_00453472 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0042747E | 9_2_0042747E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0043E43D | 9_2_0043E43D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_004325A1 | 9_2_004325A1 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0041F809 | 9_2_0041F809 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_004279F5 | 9_2_004279F5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0044DAD9 | 9_2_0044DAD9 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00433C73 | 9_2_00433C73 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00413CA0 | 9_2_00413CA0 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0043DD82 | 9_2_0043DD82 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00435F52 | 9_2_00435F52 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0043DFB1 | 9_2_0043DFB1 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_051404C8 | 9_2_051404C8 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0516E798 | 9_2_0516E798 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_051486B4 | 9_2_051486B4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05174131 | 9_2_05174131 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0514813D | 9_2_0514813D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05158099 | 9_2_05158099 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05148D5C | 9_2_05148D5C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05174DEA | 9_2_05174DEA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05156C11 | 9_2_05156C11 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0515EC70 | 9_2_0515EC70 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0513EF5A | 9_2_0513EF5A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05162E7F | 9_2_05162E7F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05148E96 | 9_2_05148E96 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0515EE9F | 9_2_0515EE9F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05154932 | 9_2_05154932 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0513495F | 9_2_0513495F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0515EA41 | 9_2_0515EA41 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0515903F | 9_2_0515903F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0515F0FC | 9_2_0515F0FC |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05153260 | 9_2_05153260 |
Source: 6.2.colorcpl.exe.7180000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.colorcpl.exe.7180000.3.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.colorcpl.exe.7180000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.colorcpl.exe.71818bf.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.colorcpl.exe.71818bf.4.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.colorcpl.exe.71818bf.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.SndVol.exe.51218bf.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.SndVol.exe.51218bf.2.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.SndVol.exe.51218bf.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.colorcpl.exe.7180000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.colorcpl.exe.7180000.3.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.colorcpl.exe.7180000.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.SndVol.exe.5120000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.SndVol.exe.5120000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.SndVol.exe.5120000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.SndVol.exe.5120000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.SndVol.exe.5120000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.SndVol.exe.5120000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.colorcpl.exe.71818bf.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.colorcpl.exe.71818bf.4.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.colorcpl.exe.71818bf.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 6.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 6.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.SndVol.exe.51218bf.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.SndVol.exe.51218bf.2.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.SndVol.exe.51218bf.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000009.00000002.2403852969.0000000005120000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000009.00000002.2403852969.0000000005120000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000009.00000002.2403852969.0000000005120000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000006.00000002.4749337631.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000006.00000002.4749337631.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000006.00000002.4749337631.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000009.00000002.2403177094.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000009.00000002.2403177094.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000009.00000002.2403177094.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000006.00000002.4755736828.0000000007180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000006.00000002.4755736828.0000000007180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000006.00000002.4755736828.0000000007180000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: colorcpl.exe PID: 5640, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: SndVol.exe PID: 7036, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: colorcpl.exe, 00000006.00000003.2521024701.0000000031B17000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496181551.00000000318F4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521089638.0000000031A55000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496591271.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2478603866.000000003179F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521229038.00000000319A1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772691610.0000000031790000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520685430.00000000315F2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2498082588.00000000318F1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520343856.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521160715.0000000031824000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: colorcpl.exe, 00000006.00000003.2521024701.0000000031B17000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496181551.00000000318F4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521089638.0000000031A55000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496591271.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2478603866.000000003179F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772817881.00000000318F0000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521229038.00000000319A1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772691610.0000000031790000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520685430.00000000315F2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2498082588.00000000318F1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520343856.0000000031591000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: colorcpl.exe, 00000006.00000003.2521024701.0000000031B17000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496181551.00000000318F4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521089638.0000000031A55000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496591271.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464432145.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2478603866.000000003179F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521229038.00000000319A1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772691610.0000000031790000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520685430.00000000315F2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2498082588.00000000318F1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520343856.0000000031591000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: colorcpl.exe, 00000006.00000003.2521024701.0000000031B17000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496181551.00000000318F4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521089638.0000000031A55000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496591271.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2478603866.000000003179F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521229038.00000000319A1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772691610.0000000031790000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520685430.00000000315F2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2498082588.00000000318F1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520343856.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521160715.0000000031824000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: colorcpl.exe, 00000006.00000003.2521024701.0000000031B17000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496181551.00000000318F4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521089638.0000000031A55000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496591271.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464432145.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2478603866.000000003179F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521229038.00000000319A1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772691610.0000000031790000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520685430.00000000315F2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2498082588.00000000318F1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520343856.0000000031591000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: colorcpl.exe, 00000006.00000003.2521024701.0000000031B17000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496181551.00000000318F4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521089638.0000000031A55000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496591271.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2464432145.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2478603866.000000003179F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521229038.00000000319A1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772691610.0000000031790000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520685430.00000000315F2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2498082588.00000000318F1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520343856.0000000031591000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: recover.exe, 0000000D.00000002.2517461592.0000000004F3F000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2515401265.0000000004F3F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: colorcpl.exe, 00000006.00000003.2521024701.0000000031B17000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496181551.00000000318F4000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521089638.0000000031A55000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2496591271.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2478603866.000000003179F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521229038.00000000319A1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000002.4772691610.0000000031790000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520685430.00000000315F2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2498082588.00000000318F1000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2520343856.0000000031591000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000006.00000003.2521160715.0000000031824000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??????s?.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: colorui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sti.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??????s?.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_029352F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, | 4_2_029352F8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 6_2_004090DC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 6_2_0040B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 6_2_0041C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 6_2_0040B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0044E989 FindFirstFileExA, | 6_2_0044E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 6_2_00408CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 6_2_00419CEE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 6_2_00407EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_00406F13 FindFirstFileW,FindNextFileW, | 6_2_00406F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0718C579 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 6_2_0718C579 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0718C374 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 6_2_0718C374 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_07188B9C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 6_2_07188B9C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719A9AD FindFirstFileW, | 6_2_0719A9AD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_071CF648 FindFirstFileExA, | 6_2_071CF648 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0719D4A4 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 6_2_0719D4A4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_07189D9B __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 6_2_07189D9B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_07187BD2 FindFirstFileW,FindNextFileW, | 6_2_07187BD2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_0718999D __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 6_2_0718999D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_054910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 6_2_054910F1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 6_2_05496580 FindFirstFileExA, | 6_2_05496580 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 9_2_004090DC |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 9_2_0040B6B5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 9_2_0041C7E5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 9_2_0040B8BA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0044E989 FindFirstFileExA, | 9_2_0044E989 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 9_2_00408CDE |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 9_2_00419CEE |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 9_2_00407EDD |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_00406F13 FindFirstFileW,FindNextFileW, | 9_2_00406F13 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0512C579 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 9_2_0512C579 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0512C374 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 9_2_0512C374 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0513A9AD FindFirstFileW, | 9_2_0513A9AD |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05128B9C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 9_2_05128B9C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0513D4A4 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 9_2_0513D4A4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0516F648 FindFirstFileExA, | 9_2_0516F648 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05129D9B __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 9_2_05129D9B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_0512999D __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 9_2_0512999D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 9_2_05127BD2 FindFirstFileW,FindNextFileW, | 9_2_05127BD2 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, | 4_2_029354BC |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: GetLocaleInfoA, | 4_2_0293A0B8 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: GetLocaleInfoA, | 4_2_0293A104 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, | 4_2_029355C8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_004520E2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_00452097 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_0045217D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoA, | 6_2_0040F26B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 6_2_0045220A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_0044844E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 6_2_0045245A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 6_2_00452583 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 6_2_0045268A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 6_2_00452757 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 6_2_00448937 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 6_2_00451E1F |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_071D2E3C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 6_2_071D2EC9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_071D2D56 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_071D2DA1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 6_2_071D2ADE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 6_2_071C95F6 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 6_2_071D3416 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 6_2_071D3349 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 6_2_071D3242 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 6_2_071D3119 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 6_2_071C910D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoA, | 6_2_0718FF2A |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, | 8_2_028F54BC |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: GetLocaleInfoA, | 8_2_028FA104 |
Source: C:\Users\user\Links\Ugisfxtz.PIF | Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, | 8_2_028F55C7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_004520E2 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_00452097 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_0045217D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoA, | 9_2_0040F26B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 9_2_0045220A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_0044844E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 9_2_0045245A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 9_2_00452583 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 9_2_0045268A |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 9_2_00452757 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 9_2_00448937 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 9_2_00451E1F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_05172D56 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_05172DA1 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_05172E3C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 9_2_05172EC9 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 9_2_05172ADE |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 9_2_051695F6 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 9_2_05173416 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 9_2_05173119 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: EnumSystemLocalesW, | 9_2_0516910D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW, | 9_2_05173349 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 9_2_05173242 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: GetLocaleInfoA, | 9_2_0512FF2A |