Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029D52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, | 0_2_029D52F8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028290DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 9_2_028290DC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0282B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 9_2_0282B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0283C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 9_2_0283C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0282B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 9_2_0282B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0286E989 FindFirstFileExA, | 9_2_0286E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02827EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 9_2_02827EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02826F13 FindFirstFileW,FindNextFileW, | 9_2_02826F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02828CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 9_2_02828CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02839CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 9_2_02839CEE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_201610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 9_2_201610F1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_20166580 FindFirstFileExA, | 9_2_20166580 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00180207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove, | 12_2_00180207 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0018589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose, | 12_2_0018589A |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00193E66 FindFirstFileW,FindNextFileW,FindClose, | 12_2_00193E66 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00184EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW, | 12_2_00184EC1 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0017532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose, | 12_2_0017532E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0040B477 FindFirstFileW,FindNextFileW, | 16_2_0040B477 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen, | 17_2_00407EF8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen, | 18_2_00407898 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 20_2_02C090DC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C0B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 20_2_02C0B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C1C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 20_2_02C1C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C0B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 20_2_02C0B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C4E989 FindFirstFileExA, | 20_2_02C4E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C07EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 20_2_02C07EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C06F13 FindFirstFileW,FindNextFileW, | 20_2_02C06F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C08CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 20_2_02C08CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C19CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 20_2_02C19CEE |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://c.pki.goog/r/gsr1.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://c.pki.goog/r/r4.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://c.pki.goog/we2/64OUIVzpZV4.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0? |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0F |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~ |
Source: colorcpl.exe, 00000009.00000003.1303796594.000000001E279000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/ |
Source: colorcpl.exe | String found in binary or memory: http://geoplugin.net/json.gp |
Source: Quotation.exe, 00000000.00000002.1299175865.0000000002A05000.00000040.00001000.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.1314109935.000000007E770000.00000004.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3729041823.0000000002820000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000014.00000002.1422292049.0000000002C00000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 00000019.00000002.1506976083.0000000002AB0000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: colorcpl.exe, 00000009.00000003.1303796594.000000001E257000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpF |
Source: colorcpl.exe, 00000009.00000003.1345257760.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345028661.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314524795.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316838262.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316705126.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1312205091.000000001E24C000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1313290082.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3742352194.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1313504758.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1303796594.000000001E257000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpP |
Source: colorcpl.exe, 00000009.00000003.1345257760.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345028661.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314524795.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316838262.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316705126.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1312205091.000000001E24C000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1313290082.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3742352194.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1313504758.000000001E257000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1303796594.000000001E257000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpW |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://i.pki.goog/gsr1.crt0- |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://i.pki.goog/r4.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://i.pki.goog/we2.crt0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://o.pki.goog/we20% |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocsp.msocsp.com0S |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://ocspx.digicert.com0E |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: colorcpl.exe, 00000009.00000002.3742936389.0000000020130000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000012.00000002.1329087613.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.ebuddy.com |
Source: colorcpl.exe, 00000009.00000002.3742936389.0000000020130000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000012.00000003.1328433001.00000000031ED000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000012.00000003.1328478014.00000000031ED000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000012.00000002.1329087613.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.com |
Source: recover.exe, 00000012.00000003.1328433001.00000000031ED000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000012.00000003.1328478014.00000000031ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.comata |
Source: colorcpl.exe, 00000009.00000002.3742936389.0000000020130000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000012.00000002.1329087613.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: colorcpl.exe, 00000009.00000002.3742936389.0000000020130000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000012.00000002.1329087613.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comr |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696428304750 |
Source: recover.exe, 00000010.00000002.1344271495.0000000002A94000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net |
Source: recover.exe, 00000012.00000002.1329087613.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net/ |
Source: Quotation.exe, 00000000.00000003.1270061813.000000007F104000.00000004.00001000.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.1295642717.0000000002543000.00000004.00001000.00020000.00000000.sdmp, Quotation.exe, 00000000.00000003.1270061813.000000007F083000.00000004.00001000.00020000.00000000.sdmp, Quotation.exe, 00000000.00000003.1269688065.000000007F084000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.pmail.com |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?77686a33b2eafa1538ef78c3be5a5910 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?caa2cf97cacae25a18f577703684ee65 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7e9591e308dbda599df1fc08720a72a3 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?c6a2869c584d2ea23c67c44abe1ec326 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: recover.exe | String found in binary or memory: https://login.yahoo.com/config/login |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://maps.windows.com/windows-app-web-link |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-04-14-10-35/PreSignInSettingsConfig.json |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=4954a0 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: colorcpl.exe, 00000009.00000002.3742936389.0000000020130000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000012.00000002.1329087613.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: recover.exe | String found in binary or memory: https://www.google.com/accounts/servicelogin |
Source: bhv72CB.tmp.16.dr | String found in binary or memory: https://www.office.com/ |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E3380 NtWriteVirtualMemory, | 0_2_029E3380 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E3034 NtAllocateVirtualMemory, | 0_2_029E3034 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E9654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, | 0_2_029E9654 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E9738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, | 0_2_029E9738 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E95CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 0_2_029E95CC |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E3C04 NtQueueApcThread, | 0_2_029E3C04 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E421C GetThreadContext,SetThreadContext,NtResumeThread, | 0_2_029E421C |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E421A GetThreadContext,SetThreadContext,NtResumeThread, | 0_2_029E421A |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E3032 NtAllocateVirtualMemory, | 0_2_029E3032 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029E9578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 0_2_029E9578 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02838267 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,GetLastError,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError, | 9_2_02838267 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0283C0A3 OpenProcess,NtResumeProcess,CloseHandle, | 9_2_0283C0A3 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0283C077 OpenProcess,NtSuspendProcess,CloseHandle, | 9_2_0283C077 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0018643A NtOpenThreadToken,NtOpenProcessToken,NtClose, | 12_2_0018643A |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00184823 NtQueryVolumeInformationFile,GetFileInformationByHandleEx, | 12_2_00184823 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00197460 EnterCriticalSection,LeaveCriticalSection,fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer, | 12_2_00197460 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_001864CA NtQueryInformationToken, | 12_2_001864CA |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00186500 NtQueryInformationToken,NtQueryInformationToken, | 12_2_00186500 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0019A135 NtSetInformationFile, | 12_2_0019A135 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0019C1FA SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memcpy,memcpy,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW, | 12_2_0019C1FA |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00174E3B _setjmp3,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,longjmp, | 12_2_00174E3B |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00184759 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,DeleteFileW,GetLastError, | 12_2_00184759 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle, | 16_2_0040BAE3 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_004016FD NtdllDefWindowProc_A, | 17_2_004016FD |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_004017B7 NtdllDefWindowProc_A, | 17_2_004017B7 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00402CAC NtdllDefWindowProc_A, | 18_2_00402CAC |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00402D66 NtdllDefWindowProc_A, | 18_2_00402D66 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02903380 NtWriteVirtualMemory, | 19_2_02903380 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02903034 NtAllocateVirtualMemory, | 19_2_02903034 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02909738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, | 19_2_02909738 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02903C04 NtQueueApcThread, | 19_2_02903C04 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_0290421A GetThreadContext,SetThreadContext,NtResumeThread, | 19_2_0290421A |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_0290421C GetThreadContext,SetThreadContext,NtResumeThread, | 19_2_0290421C |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02909809 NtQueryInformationFile,NtReadFile,NtClose, | 19_2_02909809 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02903032 NtAllocateVirtualMemory, | 19_2_02903032 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02909654 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, | 19_2_02909654 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_0290341B NtWriteVirtualMemory, | 19_2_0290341B |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_029095CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 19_2_029095CC |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_02909578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 19_2_02909578 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029D20B4 | 0_2_029D20B4 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A589E2 | 0_2_02A589E2 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A2C9EE | 0_2_02A2C9EE |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A3C94A | 0_2_02A3C94A |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A2CF65 | 0_2_02A2CF65 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A24D79 | 0_2_02A24D79 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A432F2 | 0_2_02A432F2 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A19210 | 0_2_02A19210 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A53049 | 0_2_02A53049 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A391E3 | 0_2_02A391E3 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A5969B | 0_2_02A5969B |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A2D60D | 0_2_02A2D60D |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A47730 | 0_2_02A47730 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A2D747 | 0_2_02A2D747 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A43750 | 0_2_02A43750 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A43521 | 0_2_02A43521 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A37B11 | 0_2_02A37B11 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A3D8F0 | 0_2_02A3D8F0 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A2380B | 0_2_02A2380B |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_02A439AD | 0_2_02A439AD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0283E29B | 9_2_0283E29B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02858380 | 9_2_02858380 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028573DA | 9_2_028573DA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0284809D | 9_2_0284809D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028621C0 | 9_2_028621C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028481D7 | 9_2_028481D7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0285E1E0 | 9_2_0285E1E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0287412B | 9_2_0287412B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0285774C | 9_2_0285774C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0285E43D | 9_2_0285E43D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02873472 | 9_2_02873472 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0284747E | 9_2_0284747E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028525A1 | 9_2_028525A1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0286DAD9 | 9_2_0286DAD9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0283F809 | 9_2_0283F809 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028479F5 | 9_2_028479F5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028579F6 | 9_2_028579F6 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0285DFB1 | 9_2_0285DFB1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02855F52 | 9_2_02855F52 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02857F78 | 9_2_02857F78 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02833CA0 | 9_2_02833CA0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02857CBD | 9_2_02857CBD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02853C73 | 9_2_02853C73 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0285DD82 | 9_2_0285DD82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_20177194 | 9_2_20177194 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_2016B5C1 | 9_2_2016B5C1 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00174C10 | 12_2_00174C10 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0017540A | 12_2_0017540A |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00184875 | 12_2_00184875 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_001774B1 | 12_2_001774B1 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0019695A | 12_2_0019695A |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00179144 | 12_2_00179144 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00194191 | 12_2_00194191 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0017EE03 | 12_2_0017EE03 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00177A34 | 12_2_00177A34 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00176E57 | 12_2_00176E57 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0017D660 | 12_2_0017D660 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00193E66 | 12_2_00193E66 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0019769E | 12_2_0019769E |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00185A86 | 12_2_00185A86 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00183EB3 | 12_2_00183EB3 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00184EC1 | 12_2_00184EC1 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00176B20 | 12_2_00176B20 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00180740 | 12_2_00180740 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00180BF0 | 12_2_00180BF0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044A030 | 16_2_0044A030 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0040612B | 16_2_0040612B |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0043E13D | 16_2_0043E13D |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044B188 | 16_2_0044B188 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00442273 | 16_2_00442273 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044D380 | 16_2_0044D380 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044A5F0 | 16_2_0044A5F0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_004125F6 | 16_2_004125F6 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_004065BF | 16_2_004065BF |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_004086CB | 16_2_004086CB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_004066BC | 16_2_004066BC |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044D760 | 16_2_0044D760 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00405A40 | 16_2_00405A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00449A40 | 16_2_00449A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00405AB1 | 16_2_00405AB1 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00405B22 | 16_2_00405B22 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044ABC0 | 16_2_0044ABC0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00405BB3 | 16_2_00405BB3 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00417C60 | 16_2_00417C60 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044CC70 | 16_2_0044CC70 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00418CC9 | 16_2_00418CC9 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044CDFB | 16_2_0044CDFB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044CDA0 | 16_2_0044CDA0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0044AE20 | 16_2_0044AE20 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00415E3E | 16_2_00415E3E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_00437F3B | 16_2_00437F3B |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00405038 | 17_2_00405038 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0041208C | 17_2_0041208C |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_004050A9 | 17_2_004050A9 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0040511A | 17_2_0040511A |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0043C13A | 17_2_0043C13A |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_004051AB | 17_2_004051AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00449300 | 17_2_00449300 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0040D322 | 17_2_0040D322 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0044A4F0 | 17_2_0044A4F0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0043A5AB | 17_2_0043A5AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00413631 | 17_2_00413631 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00446690 | 17_2_00446690 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0044A730 | 17_2_0044A730 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_004398D8 | 17_2_004398D8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_004498E0 | 17_2_004498E0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0044A886 | 17_2_0044A886 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0043DA09 | 17_2_0043DA09 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00438D5E | 17_2_00438D5E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00449ED0 | 17_2_00449ED0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_0041FE83 | 17_2_0041FE83 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00430F54 | 17_2_00430F54 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_004050C2 | 18_2_004050C2 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_004014AB | 18_2_004014AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00405133 | 18_2_00405133 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_004051A4 | 18_2_004051A4 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00401246 | 18_2_00401246 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_0040CA46 | 18_2_0040CA46 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00405235 | 18_2_00405235 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_004032C8 | 18_2_004032C8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00401689 | 18_2_00401689 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00402F60 | 18_2_00402F60 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: 19_2_028F20B4 | 19_2_028F20B4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C1E29B | 20_2_02C1E29B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C373DA | 20_2_02C373DA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C38380 | 20_2_02C38380 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C2809D | 20_2_02C2809D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C421C0 | 20_2_02C421C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C281D7 | 20_2_02C281D7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C3E1E0 | 20_2_02C3E1E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C5412B | 20_2_02C5412B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C3774C | 20_2_02C3774C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C53472 | 20_2_02C53472 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C2747E | 20_2_02C2747E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C3E43D | 20_2_02C3E43D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C325A1 | 20_2_02C325A1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C4DAD9 | 20_2_02C4DAD9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C1F809 | 20_2_02C1F809 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C379F6 | 20_2_02C379F6 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C279F5 | 20_2_02C279F5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C3DFB1 | 20_2_02C3DFB1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C35F52 | 20_2_02C35F52 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C37F78 | 20_2_02C37F78 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C13CA0 | 20_2_02C13CA0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C37CBD | 20_2_02C37CBD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C33C73 | 20_2_02C33C73 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C3DD82 | 20_2_02C3DD82 |
Source: 20.2.colorcpl.exe.2c00000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 20.2.colorcpl.exe.2c00000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 20.2.colorcpl.exe.2c00000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.colorcpl.exe.2820000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.colorcpl.exe.2820000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.colorcpl.exe.2820000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 25.2.SndVol.exe.2ab0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 25.2.SndVol.exe.2ab0000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 25.2.SndVol.exe.2ab0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 20.2.colorcpl.exe.2c00000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 20.2.colorcpl.exe.2c00000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 20.2.colorcpl.exe.2c00000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 25.2.SndVol.exe.2ab0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 25.2.SndVol.exe.2ab0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 25.2.SndVol.exe.2ab0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 9.2.colorcpl.exe.2820000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 9.2.colorcpl.exe.2820000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 9.2.colorcpl.exe.2820000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.Quotation.exe.29d0000.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.Quotation.exe.29d0000.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000014.00000002.1422292049.0000000002C00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000014.00000002.1422292049.0000000002C00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000014.00000002.1422292049.0000000002C00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000009.00000002.3729041823.0000000002820000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000009.00000002.3729041823.0000000002820000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000009.00000002.3729041823.0000000002820000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000019.00000002.1506976083.0000000002AB0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000019.00000002.1506976083.0000000002AB0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000019.00000002.1506976083.0000000002AB0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.1299175865.0000000002A05000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000000.00000002.1314109935.000000007E770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: Quotation.exe PID: 8940, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 8196, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: colorcpl.exe PID: 6940, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: SndVol.exe PID: 6812, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: colorcpl.exe, 00000009.00000003.1345209100.0000000020611000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3743327467.0000000020810000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345718928.0000000020A4A000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316483283.0000000020993000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316887237.0000000020BC0000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345664304.00000000208B2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1315605874.000000002081F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1344853674.0000000020673000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345547353.0000000020B0D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316639906.000000002058B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314484058.0000000020611000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: colorcpl.exe, 00000009.00000002.3743459386.0000000020BC0000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345209100.0000000020611000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3743327467.0000000020810000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345718928.0000000020A4A000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316483283.0000000020993000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316887237.0000000020BC0000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345664304.00000000208B2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1315605874.000000002081F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1344853674.0000000020673000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345547353.0000000020B0D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316639906.000000002058B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: colorcpl.exe, 00000009.00000003.1345209100.0000000020611000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3743327467.0000000020810000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345718928.0000000020A4A000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316483283.0000000020993000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316887237.0000000020BC0000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345664304.00000000208B2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1315605874.000000002081F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1344853674.0000000020673000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345547353.0000000020B0D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316639906.000000002058B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314484058.0000000020611000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: colorcpl.exe, 00000009.00000003.1345209100.0000000020611000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3743327467.0000000020810000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345718928.0000000020A4A000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316483283.0000000020993000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316887237.0000000020BC0000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345664304.00000000208B2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1315605874.000000002081F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1344853674.0000000020673000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345547353.0000000020B0D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316639906.000000002058B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314484058.0000000020611000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: colorcpl.exe, 00000009.00000003.1345209100.0000000020611000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3743327467.0000000020810000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345718928.0000000020A4A000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316483283.0000000020993000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316887237.0000000020BC0000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345664304.00000000208B2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1315605874.000000002081F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1344853674.0000000020673000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345547353.0000000020B0D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316639906.000000002058B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314484058.0000000020611000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: colorcpl.exe, 00000009.00000003.1345209100.0000000020611000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3743327467.0000000020810000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345718928.0000000020A4A000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316483283.0000000020993000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316887237.0000000020BC0000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345664304.00000000208B2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1315605874.000000002081F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1344853674.0000000020673000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345547353.0000000020B0D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316639906.000000002058B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314484058.0000000020611000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: recover.exe, 00000010.00000002.1344829611.0000000004F03000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: colorcpl.exe, 00000009.00000003.1345209100.0000000020611000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000002.3743327467.0000000020810000.00000040.10000000.00040000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345718928.0000000020A4A000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316483283.0000000020993000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316887237.0000000020BC0000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345664304.00000000208B2000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1315605874.000000002081F000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1344853674.0000000020673000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1345547353.0000000020B0D000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1316639906.000000002058B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000009.00000003.1314484058.0000000020611000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: olepro32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Quotation.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: colorui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: olepro32.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: colorui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: olepro32.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Links\Agcakrhb.PIF | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: dwmapi.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: winmm.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: wininet.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: twinapi.appcore.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: mrmcorer.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: biwinrt.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.staterepositorycore.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: wincorlib.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: cabinet.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: bingconfigurationclient.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: bcp47langs.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: msvcp110_win.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.storage.applicationdata.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windowsudk.shellcommon.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: dictationmanager.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: policymanager.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: slc.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: sppc.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.staterepositoryclient.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.ui.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windowmanagementapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: textinputframework.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: inputhost.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: languageoverlayutil.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: bcp47mrm.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.web.http.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: audioses.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: winmmbase.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: mmdevapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: mmdevapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: devobj.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.applicationmodel.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.ui.immersive.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.globalization.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: logoncli.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: flightsettings.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.cortana.proxystub.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.security.authentication.onlineid.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: winnsi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: profext.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: firewallapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: fwbase.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: schannel.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: certenroll.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: certca.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: dsparse.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: mlang.dll | |
Source: C:\Windows\System32\backgroundTaskHost.exe | Section loaded: windows.web.dll | |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: 0_2_029D52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA, | 0_2_029D52F8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_028290DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 9_2_028290DC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0282B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 9_2_0282B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0283C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 9_2_0283C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0282B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 9_2_0282B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_0286E989 FindFirstFileExA, | 9_2_0286E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02827EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 9_2_02827EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02826F13 FindFirstFileW,FindNextFileW, | 9_2_02826F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02828CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 9_2_02828CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_02839CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 9_2_02839CEE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_201610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 9_2_201610F1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 9_2_20166580 FindFirstFileExA, | 9_2_20166580 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00180207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove, | 12_2_00180207 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0018589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose, | 12_2_0018589A |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00193E66 FindFirstFileW,FindNextFileW,FindClose, | 12_2_00193E66 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_00184EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW, | 12_2_00184EC1 |
Source: C:\Users\Public\alpha.pif | Code function: 12_2_0017532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose, | 12_2_0017532E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 16_2_0040B477 FindFirstFileW,FindNextFileW, | 16_2_0040B477 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen, | 17_2_00407EF8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen, | 18_2_00407898 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, | 20_2_02C090DC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C0B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 20_2_02C0B6B5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C1C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, | 20_2_02C1C7E5 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C0B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 20_2_02C0B8BA |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C4E989 FindFirstFileExA, | 20_2_02C4E989 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C07EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, | 20_2_02C07EDD |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C06F13 FindFirstFileW,FindNextFileW, | 20_2_02C06F13 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C08CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, | 20_2_02C08CDE |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 20_2_02C19CEE FindFirstFileW,FindNextFileW,FindNextFileW, | 20_2_02C19CEE |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, | 0_2_029D54BC |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: GetLocaleInfoA, | 0_2_029DA0B8 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: GetLocaleInfoA, | 0_2_029DA104 |
Source: C:\Users\user\Desktop\Quotation.exe | Code function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA, | 0_2_029D55C8 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoA, | 9_2_0282F26B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 9_2_0287220A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 9_2_02872097 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 9_2_028720E2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 9_2_0287217D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 9_2_0287268A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 9_2_02872757 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 9_2_0286844E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 9_2_0287245A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 9_2_02872583 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 9_2_02868937 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 9_2_02871E1F |
Source: C:\Users\Public\alpha.pif | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale, | 12_2_00178572 |
Source: C:\Users\Public\alpha.pif | Code function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,GetDateFormatW,memmove,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,GetLastError,realloc, | 12_2_00176854 |
Source: C:\Users\Public\alpha.pif | Code function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW, | 12_2_00179310 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, | 19_2_028F54BC |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: GetLocaleInfoA, | 19_2_028FA104 |
Source: C:\Users\user\Links\Agcakrhb.PIF | Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, | 19_2_028F55C7 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoA, | 20_2_02C0F26B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 20_2_02C5220A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 20_2_02C520E2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 20_2_02C52097 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 20_2_02C5217D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 20_2_02C5268A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 20_2_02C52757 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: EnumSystemLocalesW, | 20_2_02C4844E |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 20_2_02C5245A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 20_2_02C52583 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: GetLocaleInfoW, | 20_2_02C48937 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 20_2_02C51E1F |