Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008E445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_008E445A |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EC6D1 FindFirstFileW,FindClose, | 0_2_008EC6D1 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_008EC75C |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_008EEF95 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_008EF0F2 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_008EF3F3 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_008E37EF |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_008E3B12 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_008EBCBC |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023445A GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_0023445A |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023C6D1 FindFirstFileW,FindClose, | 2_2_0023C6D1 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0023C75C |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0023EF95 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0023F0F2 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0023F3F3 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_002337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_002337EF |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00233B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00233B12 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0023BCBC |
Source: RegSvcs.exe, 00000003.00000002.2280877966.00000000029F3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2280877966.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2280877966.00000000029D8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3377153250.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3377153250.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3377153250.0000000002F03000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: drawlingly.exe, 00000002.00000002.2156125410.0000000001280000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2277021292.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2277908955.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2280877966.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2280877966.00000000029D8000.00000004.00000800.00020000.00000000.sdmp, drawlingly.exe, 00000005.00000002.2279266294.0000000001AB0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3377153250.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3377153250.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hosting |
Source: RegSvcs.exe, 00000006.00000002.3376647074.000000000121D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hostingJhy |
Source: RegSvcs.exe, 00000006.00000002.3376647074.000000000121D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hostingih |
Source: RegSvcs.exe, 00000003.00000002.2280877966.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2280877966.00000000029D8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3377153250.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3377153250.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: drawlingly.exe, 00000002.00000002.2156125410.0000000001280000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2277021292.0000000000402000.00000040.80000000.00040000.00000000.sdmp, drawlingly.exe, 00000005.00000002.2279266294.0000000001AB0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://account.dyn.com/ |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_0090CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_0090CABC |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0025CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_0025CABC |
Source: 5.2.drawlingly.exe.1ab0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.drawlingly.exe.1ab0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 2.2.drawlingly.exe.1280000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 2.2.drawlingly.exe.1280000.1.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 5.2.drawlingly.exe.1ab0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 5.2.drawlingly.exe.1ab0000.1.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 00000002.00000002.2156125410.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000002.00000002.2156125410.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 00000005.00000002.2279266294.0000000001AB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000005.00000002.2279266294.0000000001AB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: This is a third-party compiled AutoIt script. | 0_2_00883B3A |
Source: ORDER_66688IO875545422245.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: ORDER_66688IO875545422245.exe, 00000000.00000003.2134584922.0000000004243000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_51872206-5 |
Source: ORDER_66688IO875545422245.exe, 00000000.00000003.2134584922.0000000004243000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_b01f52c7-a |
Source: ORDER_66688IO875545422245.exe, 00000000.00000002.2135764710.0000000000934000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_ec003618-8 |
Source: ORDER_66688IO875545422245.exe, 00000000.00000002.2135764710.0000000000934000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_fbb5f35c-9 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: This is a third-party compiled AutoIt script. | 2_2_001D3B3A |
Source: drawlingly.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: drawlingly.exe, 00000002.00000002.2155389814.0000000000284000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_be185509-f |
Source: drawlingly.exe, 00000002.00000002.2155389814.0000000000284000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_ea42ef7d-e |
Source: drawlingly.exe, 00000005.00000000.2256515169.0000000000284000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_e2a184b9-c |
Source: drawlingly.exe, 00000005.00000000.2256515169.0000000000284000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_4f416e6e-a |
Source: ORDER_66688IO875545422245.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_db6069f3-b |
Source: ORDER_66688IO875545422245.exe | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_dcb97459-a |
Source: drawlingly.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_4f94a71d-8 |
Source: drawlingly.exe.0.dr | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_a25906ff-e |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008AD975 | 0_2_008AD975 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008A21C5 | 0_2_008A21C5 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008B62D2 | 0_2_008B62D2 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_009003DA | 0_2_009003DA |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008B242E | 0_2_008B242E |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008A25FA | 0_2_008A25FA |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_0088E6A0 | 0_2_0088E6A0 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008966E1 | 0_2_008966E1 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008DE616 | 0_2_008DE616 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008B878F | 0_2_008B878F |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008E8889 | 0_2_008E8889 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00898808 | 0_2_00898808 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00900857 | 0_2_00900857 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008B6844 | 0_2_008B6844 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008ACB21 | 0_2_008ACB21 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008B6DB6 | 0_2_008B6DB6 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00896F9E | 0_2_00896F9E |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00893030 | 0_2_00893030 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008A3187 | 0_2_008A3187 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008AF1D9 | 0_2_008AF1D9 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00881287 | 0_2_00881287 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008A1484 | 0_2_008A1484 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00895520 | 0_2_00895520 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008A7696 | 0_2_008A7696 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00895760 | 0_2_00895760 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008A1978 | 0_2_008A1978 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008B9AB5 | 0_2_008B9AB5 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_0088FCE0 | 0_2_0088FCE0 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008A1D90 | 0_2_008A1D90 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008ABDA6 | 0_2_008ABDA6 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00907DDB | 0_2_00907DDB |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00893FE0 | 0_2_00893FE0 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_0088DF00 | 0_2_0088DF00 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_0186C3D0 | 0_2_0186C3D0 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001DE6A0 | 2_2_001DE6A0 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001FD975 | 2_2_001FD975 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001DFCE0 | 2_2_001DFCE0 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001F21C5 | 2_2_001F21C5 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_002062D2 | 2_2_002062D2 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_002503DA | 2_2_002503DA |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0020242E | 2_2_0020242E |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001F25FA | 2_2_001F25FA |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0022E616 | 2_2_0022E616 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001E66E1 | 2_2_001E66E1 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0020878F | 2_2_0020878F |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001E8808 | 2_2_001E8808 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00206844 | 2_2_00206844 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00250857 | 2_2_00250857 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00238889 | 2_2_00238889 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001FCB21 | 2_2_001FCB21 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00206DB6 | 2_2_00206DB6 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001E6F9E | 2_2_001E6F9E |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001E3030 | 2_2_001E3030 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001F3187 | 2_2_001F3187 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001FF1D9 | 2_2_001FF1D9 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001D1287 | 2_2_001D1287 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001F1484 | 2_2_001F1484 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001E5520 | 2_2_001E5520 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001F7696 | 2_2_001F7696 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001E5760 | 2_2_001E5760 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001F1978 | 2_2_001F1978 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00209AB5 | 2_2_00209AB5 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001F1D90 | 2_2_001F1D90 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001FBDA6 | 2_2_001FBDA6 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00257DDB | 2_2_00257DDB |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001DDF00 | 2_2_001DDF00 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001E3FE0 | 2_2_001E3FE0 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0135AAC8 | 2_2_0135AAC8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_00E7A6E0 | 3_2_00E7A6E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_00E7D890 | 3_2_00E7D890 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_00E74A88 | 3_2_00E74A88 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_00E73E70 | 3_2_00E73E70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_00E741B8 | 3_2_00E741B8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_06062300 | 3_2_06062300 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_06061150 | 3_2_06061150 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_06063AB0 | 3_2_06063AB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 3_2_060633C8 | 3_2_060633C8 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 5_2_0133A2F0 | 5_2_0133A2F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_02C7A6C5 | 6_2_02C7A6C5 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_02C74A88 | 6_2_02C74A88 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_02C7D890 | 6_2_02C7D890 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_02C73E70 | 6_2_02C73E70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_02C741B8 | 6_2_02C741B8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_02C77A70 | 6_2_02C77A70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_06732300 | 6_2_06732300 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_06731150 | 6_2_06731150 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_06733AB0 | 6_2_06733AB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 6_2_067333C8 | 6_2_067333C8 |
Source: 5.2.drawlingly.exe.1ab0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.drawlingly.exe.1ab0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 2.2.drawlingly.exe.1280000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 2.2.drawlingly.exe.1280000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 5.2.drawlingly.exe.1ab0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 5.2.drawlingly.exe.1ab0000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 00000002.00000002.2156125410.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000002.00000002.2156125410.0000000001280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 00000005.00000002.2279266294.0000000001AB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000005.00000002.2279266294.0000000001AB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, ekKu0.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, vKf1z6NvS.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, ZNAvlD7qmXc.cs | Cryptographic APIs: 'CreateDecryptor', 'TransformBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, U2doU2.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, BgffYko.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, HrTdA63.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, Vvp22TrBv9g.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, Vvp22TrBv9g.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, Vvp22TrBv9g.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 2.2.drawlingly.exe.1280000.1.raw.unpack, Vvp22TrBv9g.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008848D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_008848D7 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_00905376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_00905376 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_001D48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 2_2_001D48D7 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00255376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 2_2_00255376 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008E445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_008E445A |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EC6D1 FindFirstFileW,FindClose, | 0_2_008EC6D1 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_008EC75C |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_008EEF95 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_008EF0F2 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_008EF3F3 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_008E37EF |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_008E3B12 |
Source: C:\Users\user\Desktop\ORDER_66688IO875545422245.exe | Code function: 0_2_008EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_008EBCBC |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023445A GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_0023445A |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023C6D1 FindFirstFileW,FindClose, | 2_2_0023C6D1 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0023C75C |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0023EF95 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0023F0F2 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0023F3F3 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_002337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_002337EF |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_00233B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00233B12 |
Source: C:\Users\user\AppData\Local\exhilaratingly\drawlingly.exe | Code function: 2_2_0023BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0023BCBC |