Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_028F52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, |
3_2_028F52F8 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
8_2_02E090DC |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E0B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
8_2_02E0B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E1C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
8_2_02E1C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E0B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
8_2_02E0B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E4E989 FindFirstFileExA, |
8_2_02E4E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E07EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
8_2_02E07EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E06F13 FindFirstFileW,FindNextFileW, |
8_2_02E06F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E19CEE FindFirstFileW,FindNextFileW,FindNextFileW, |
8_2_02E19CEE |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E08CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
8_2_02E08CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_030090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
16_2_030090DC |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0301C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
16_2_0301C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0300B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
16_2_0300B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0304E989 FindFirstFileExA, |
16_2_0304E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0300B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
16_2_0300B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03006F13 FindFirstFileW,FindNextFileW, |
16_2_03006F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03007EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
16_2_03007EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03008CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
16_2_03008CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03019CEE FindFirstFileW,FindNextFileW,FindNextFileW, |
16_2_03019CEE |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49705 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49716 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49735 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49722 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49702 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49708 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49709 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49732 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49746 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49736 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49698 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49721 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49703 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49726 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49696 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49713 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49737 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49724 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49729 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49748 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49711 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49723 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49693 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49734 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49733 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49742 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49699 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49718 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49712 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49707 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49728 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49710 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49697 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49730 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49714 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49704 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49706 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49740 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49731 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49719 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49747 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49744 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49739 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49738 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49745 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49720 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49725 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49743 -> 196.251.83.79:786 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49741 -> 196.251.83.79:786 |
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02903380 NtWriteVirtualMemory, |
3_2_02903380 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02903034 NtAllocateVirtualMemory, |
3_2_02903034 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02909654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, |
3_2_02909654 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02909738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, |
3_2_02909738 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_029095CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
3_2_029095CC |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02903C04 NtQueueApcThread, |
3_2_02903C04 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0290421A GetThreadContext,SetThreadContext,NtResumeThread, |
3_2_0290421A |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0290421C GetThreadContext,SetThreadContext,NtResumeThread, |
3_2_0290421C |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02903032 NtAllocateVirtualMemory, |
3_2_02903032 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02909578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
3_2_02909578 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02973380 NtWriteVirtualMemory, |
15_2_02973380 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02973034 NtAllocateVirtualMemory, |
15_2_02973034 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02979738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, |
15_2_02979738 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02973C04 NtQueueApcThread, |
15_2_02973C04 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_0297421C GetThreadContext,SetThreadContext,NtResumeThread, |
15_2_0297421C |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_0297421A GetThreadContext,SetThreadContext,NtResumeThread, |
15_2_0297421A |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02979809 NtQueryInformationFile,NtReadFile,NtClose, |
15_2_02979809 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02973032 NtAllocateVirtualMemory, |
15_2_02973032 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02979654 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, |
15_2_02979654 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_0297341B NtWriteVirtualMemory, |
15_2_0297341B |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_029795CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
15_2_029795CC |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_02979578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
15_2_02979578 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_028F20B4 |
3_2_028F20B4 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_029789E2 |
3_2_029789E2 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0294C9EE |
3_2_0294C9EE |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0295C94A |
3_2_0295C94A |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0294CF65 |
3_2_0294CF65 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02944D79 |
3_2_02944D79 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_029632F2 |
3_2_029632F2 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02939210 |
3_2_02939210 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02973049 |
3_2_02973049 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_029591E3 |
3_2_029591E3 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0297969B |
3_2_0297969B |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0294D60D |
3_2_0294D60D |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02967730 |
3_2_02967730 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02963750 |
3_2_02963750 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0294D747 |
3_2_0294D747 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02963521 |
3_2_02963521 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_02957B11 |
3_2_02957B11 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0295D8F0 |
3_2_0295D8F0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_0294380B |
3_2_0294380B |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Code function: 3_2_029639AD |
3_2_029639AD |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E1E29B |
8_2_02E1E29B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E373DA |
8_2_02E373DA |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E38380 |
8_2_02E38380 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E2809D |
8_2_02E2809D |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E3E1E0 |
8_2_02E3E1E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E421C0 |
8_2_02E421C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E281D7 |
8_2_02E281D7 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E5412B |
8_2_02E5412B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E3774C |
8_2_02E3774C |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E53472 |
8_2_02E53472 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E2747E |
8_2_02E2747E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E3E43D |
8_2_02E3E43D |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E325A1 |
8_2_02E325A1 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E4DAD9 |
8_2_02E4DAD9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E1F809 |
8_2_02E1F809 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E379F6 |
8_2_02E379F6 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E279F5 |
8_2_02E279F5 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E3DFB1 |
8_2_02E3DFB1 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E37F78 |
8_2_02E37F78 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E35F52 |
8_2_02E35F52 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E13CA0 |
8_2_02E13CA0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E37CBD |
8_2_02E37CBD |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E33C73 |
8_2_02E33C73 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 8_2_02E3DD82 |
8_2_02E3DD82 |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Code function: 15_2_029620B4 |
15_2_029620B4 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03038380 |
16_2_03038380 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_030373DA |
16_2_030373DA |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0301E29B |
16_2_0301E29B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0305412B |
16_2_0305412B |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_030421C0 |
16_2_030421C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_030281D7 |
16_2_030281D7 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0303E1E0 |
16_2_0303E1E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0302809D |
16_2_0302809D |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0303774C |
16_2_0303774C |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_030325A1 |
16_2_030325A1 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0303E43D |
16_2_0303E43D |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03053472 |
16_2_03053472 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0302747E |
16_2_0302747E |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0304DAD9 |
16_2_0304DAD9 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_030379F6 |
16_2_030379F6 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_030279F5 |
16_2_030279F5 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0301F809 |
16_2_0301F809 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03035F52 |
16_2_03035F52 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03037F78 |
16_2_03037F78 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0303DFB1 |
16_2_0303DFB1 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_0303DD82 |
16_2_0303DD82 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03033C73 |
16_2_03033C73 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03013CA0 |
16_2_03013CA0 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 16_2_03037CBD |
16_2_03037CBD |
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 16.2.colorcpl.exe.3000000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.colorcpl.exe.2e00000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 16.2.colorcpl.exe.3000000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.colorcpl.exe.2e00000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 19.2.colorcpl.exe.2bd0000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 19.2.colorcpl.exe.2bd0000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.x.exe.28f0000.1.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000010.00000002.1343119653.0000000003000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000003.00000002.1269621108.000000007E4F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000003.00000002.1255776445.0000000002925000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000013.00000002.1422872475.0000000002BD0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000002.2501429735.0000000002E00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: x.exe PID: 6980, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 5516, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 7308, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 7504, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: jscript.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msxml3.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msdart.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ??????????.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: tquery.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: cryptdll.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: sppwmi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: sppcext.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: winscard.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: colorui.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mscms.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coloradapterclient.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: tquery.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: cryptdll.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sppwmi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sppcext.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winscard.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: colorui.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mscms.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coloradapterclient.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: tquery.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: cryptdll.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sppwmi.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: sppcext.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: winscard.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Links\Ekbmajrx.PIF |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: colorui.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mscms.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coloradapterclient.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |