Source: 22.2.mobsync.exe.400000.0.unpack |
Malware Configuration Extractor: Remcos {"Version": "3.1.5 Pro", "Host:Port:Password": "ongod4ever.ddns.net:5652:0", "Assigned name": "ABLE GOD", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-8VTGWT", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"} |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Virustotal: Detection: 26% |
Perma Link |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
ReversingLabs: Detection: 24% |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.937782591.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.825096146.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.938674908.0000000002EA7000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827146573.0000000003178000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.939914286.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827407780.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.851109980.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850918949.0000000003327000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 1368, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 4108, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: secinit.exe PID: 6644, type: MEMORYSTR |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose, |
5_2_004170AC |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_00406176 FindFirstFileW,FindNextFileW, |
5_2_00406176 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose, |
22_2_004170AC |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_00406176 FindFirstFileW,FindNextFileW, |
22_2_00406176 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0040A3AF FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
22_2_0040A3AF |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0040A5CA FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
22_2_0040A5CA |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004456A9 FindFirstFileExA, |
22_2_004456A9 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004077EE __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
22_2_004077EE |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_00406930 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW, |
22_2_00406930 |
Source: Iqzenco.exe, 00000010.00000003.750864485.00000000007B1000.00000004.00000001.sdmp |
String found in binary or memory: https://bl30uw.sn.files.1drv.com/y4mGst0byrg6Ub0CK8iKHaximJI4M7D1uUmqxfl02ZpIfKXbkyeYXQLL6P2J6UxS4Yz |
Source: Iqzenco.exe, 00000010.00000003.752060770.00000000007A3000.00000004.00000001.sdmp |
String found in binary or memory: https://bl30uw.sn.files.1drv.com/y4maOmpRLgEZgKpnLv-hczrMb96VqtMQDZd-m0g51QRpK-v8c65WYNUi2NOLDdGNQiU |
Source: Iqzenco.exe, 00000010.00000003.750846747.00000000007A3000.00000004.00000001.sdmp |
String found in binary or memory: https://bl30uw.sn.files.1drv.com/y4msI7_EyjC8cs97rdyt7ReCTl2WoedGiqx9hVOiugfpodFj4cXgoX5lAQfrGe41zrt |
Source: Iqzenco.exe, 00000010.00000003.752060770.00000000007A3000.00000004.00000001.sdmp |
String found in binary or memory: https://onedrive.live.com/download?cid=97429F42E815B766&resid=97429F42E815B766%21166&authkey=AFRFbbm |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004126A5 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, |
22_2_004126A5 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004089BC GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx, |
22_2_004089BC |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004126A5 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, |
22_2_004126A5 |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.937782591.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.825096146.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.938674908.0000000002EA7000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827146573.0000000003178000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.939914286.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827407780.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.851109980.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850918949.0000000003327000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 1368, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 4108, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: secinit.exe PID: 6644, type: MEMORYSTR |
Source: 22.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 26.2.secinit.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 26.2.secinit.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 26.2.secinit.exe.50601a02.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 22.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 26.2.secinit.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 22.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 22.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000005.00000002.937782591.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000016.00000002.825096146.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
Source: 22.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 26.2.secinit.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 26.2.secinit.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 26.2.secinit.exe.50601a02.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 22.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 26.2.secinit.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 22.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 22.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000005.00000002.937782591.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000016.00000002.825096146.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: C:\Users\Public\Libraries\ocnezqI.url, type: DROPPED |
Matched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0042E02D |
5_2_0042E02D |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_004330D1 |
5_2_004330D1 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0043424F |
5_2_0043424F |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0042220F |
5_2_0042220F |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0041A3F8 |
5_2_0041A3F8 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0042E02D |
22_2_0042E02D |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004330D1 |
22_2_004330D1 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0043424F |
22_2_0043424F |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0042220F |
22_2_0042220F |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0041A3F8 |
22_2_0041A3F8 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004304DB |
22_2_004304DB |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0044C56A |
22_2_0044C56A |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004335CD |
22_2_004335CD |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0043E6E0 |
22_2_0043E6E0 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0044A725 |
22_2_0044A725 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004378EC |
22_2_004378EC |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004228AD |
22_2_004228AD |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004339E5 |
22_2_004339E5 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004229F0 |
22_2_004229F0 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: String function: 0042EDF6 appears 64 times |
|
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: String function: 00402064 appears 87 times |
|
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: String function: 0042F460 appears 43 times |
|
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: String function: 004165D8 appears 37 times |
|
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: String function: 004020B5 appears 31 times |
|
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: String function: 00404818 appears 31 times |
|
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: Iqzenco.exe.0.dr |
Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST |
Source: Iqzenco.exe.0.dr |
Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Virustotal: Detection: 26% |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
ReversingLabs: Detection: 24% |
Source: unknown |
Process created: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe 'C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe' |
|
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe |
|
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' ' |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\nest.bat' ' |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg delete hkcu\Environment /v windir /f |
|
Source: C:\Windows\SysWOW64\reg.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: unknown |
Process created: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe 'C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe' |
|
Source: unknown |
Process created: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe 'C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe' |
|
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe |
|
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process created: C:\Windows\SysWOW64\secinit.exe C:\Windows\System32\secinit.exe |
|
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' ' |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\nest.bat' ' |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg delete hkcu\Environment /v windir /f |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process created: C:\Windows\SysWOW64\secinit.exe C:\Windows\System32\secinit.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_004132F7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, |
5_2_004132F7 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004132F7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, |
22_2_004132F7 |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0040D1AD GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CreateMutexA,CloseHandle, |
5_2_0040D1AD |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1852:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5192:120:WilError_01 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Remcos-8VTGWT |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5744:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5508:120:WilError_01 |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' ' |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: ..... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: ...... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: ..... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: .... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: ...... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: .... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: ...... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: ...... |
Source: ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Static PE information: section name: ..... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: ..... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: ...... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: ..... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: .... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: ...... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: .... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: ...... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: ...... |
Source: Iqzenco.exe.0.dr |
Static PE information: section name: ..... |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0040D072 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress, |
5_2_0040D072 |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File created: \entrega de documentos dhl _ 27-09-21,pdf.exe |
|
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File created: \entrega de documentos dhl _ 27-09-21,pdf.exe |
|
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File created: \entrega de documentos dhl _ 27-09-21,pdf.exe |
|
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File created: \entrega de documentos dhl _ 27-09-21,pdf.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File created: \entrega de documentos dhl _ 27-09-21,pdf.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
File created: \entrega de documentos dhl _ 27-09-21,pdf.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Iqzenco |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Iqzenco |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0040D072 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress, |
5_2_0040D072 |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose, |
5_2_004170AC |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_00406176 FindFirstFileW,FindNextFileW, |
5_2_00406176 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose, |
22_2_004170AC |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_00406176 FindFirstFileW,FindNextFileW, |
22_2_00406176 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0040A3AF FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
22_2_0040A3AF |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0040A5CA FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
22_2_0040A5CA |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004456A9 FindFirstFileExA, |
22_2_004456A9 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004077EE __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, |
22_2_004077EE |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_00406930 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW, |
22_2_00406930 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0040D072 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress, |
5_2_0040D072 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0042F1CD SetUnhandledExceptionFilter, |
5_2_0042F1CD |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_0042F07F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
5_2_0042F07F |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 5_2_004360A3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
5_2_004360A3 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0042F1CD SetUnhandledExceptionFilter, |
22_2_0042F1CD |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0042F07F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
22_2_0042F07F |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_004360A3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
22_2_004360A3 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0042F62C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
22_2_0042F62C |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2C60000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2C70000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2C80000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D10000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D20000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D30000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D40000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D50000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D60000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D70000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D80000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 50600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D90000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2DA0000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D30000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D40000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2D50000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2DE0000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 2DF0000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3000000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3010000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3020000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3030000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3040000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3050000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 50600000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3060000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\mobsync.exe base: 3070000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 2F50000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 2F60000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 2F70000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3200000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3210000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3220000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3230000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3240000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3250000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3260000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3270000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 50600000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3280000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory written: C:\Windows\SysWOW64\secinit.exe base: 3290000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 50600000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2C60000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2C70000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2C80000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D10000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D20000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D30000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D40000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D50000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D60000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D70000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D80000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D90000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2DA0000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 50600000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D30000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D40000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2D50000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2DE0000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 2DF0000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3000000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3010000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3020000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3030000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3040000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3050000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3060000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\mobsync.exe base: 3070000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 50600000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 2F50000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 2F60000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 2F70000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3200000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3210000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3220000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3230000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3240000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3250000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3260000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3270000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3280000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Memory allocated: C:\Windows\SysWOW64\secinit.exe base: 3290000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 2C80000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 2D40000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 2D80000 |
Jump to behavior |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 2DA0000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 2D50000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 3010000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 3050000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\mobsync.exe EIP: 3070000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\secinit.exe EIP: 2F70000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\secinit.exe EIP: 3230000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\secinit.exe EIP: 3270000 |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Thread created: C:\Windows\SysWOW64\secinit.exe EIP: 3290000 |
Jump to behavior |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,Sleep,CloseHandle,OpenProcess, \svchost.exe |
22_2_0040F4B7 |
Source: C:\Users\user\Desktop\ENTREGA DE DOCUMENTOS DHL _ 27-09-21,pdf.exe |
Process created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg delete hkcu\Environment /v windir /f |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe |
Jump to behavior |
Source: C:\Users\Public\Libraries\Iqzenco\Iqzenco.exe |
Process created: C:\Windows\SysWOW64\secinit.exe C:\Windows\System32\secinit.exe |
Jump to behavior |
Source: mobsync.exe, 00000005.00000000.720932112.00000000035A0000.00000002.00020000.sdmp, mobsync.exe, 00000016.00000000.816684928.00000000038C0000.00000002.00020000.sdmp |
Binary or memory string: Program Manager |
Source: mobsync.exe, 00000005.00000000.720932112.00000000035A0000.00000002.00020000.sdmp, mobsync.exe, 00000016.00000000.816684928.00000000038C0000.00000002.00020000.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: mobsync.exe, 00000005.00000000.720932112.00000000035A0000.00000002.00020000.sdmp, mobsync.exe, 00000016.00000000.816684928.00000000038C0000.00000002.00020000.sdmp |
Binary or memory string: Progman |
Source: mobsync.exe, 00000005.00000000.720932112.00000000035A0000.00000002.00020000.sdmp, mobsync.exe, 00000016.00000000.816684928.00000000038C0000.00000002.00020000.sdmp |
Binary or memory string: Progmanlock |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW, |
5_2_00441069 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW, |
5_2_00449143 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
5_2_0044926C |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW, |
5_2_00449373 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW, |
22_2_00441069 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW, |
22_2_00449143 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
22_2_0044926C |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoW, |
22_2_00449373 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
22_2_00449440 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: GetLocaleInfoA, |
22_2_0040D585 |
Source: C:\Windows\SysWOW64\mobsync.exe |
Code function: 22_2_0044190C _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free, |
22_2_0044190C |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.937782591.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.825096146.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.938674908.0000000002EA7000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827146573.0000000003178000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.939914286.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827407780.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.851109980.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850918949.0000000003327000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 1368, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 4108, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: secinit.exe PID: 6644, type: MEMORYSTR |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.50601a02.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 26.2.secinit.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.50601a02.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.937782591.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.825096146.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.938674908.0000000002EA7000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827146573.0000000003178000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.939914286.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.827407780.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.851109980.0000000050601000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.850918949.0000000003327000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 1368, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: mobsync.exe PID: 4108, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: secinit.exe PID: 6644, type: MEMORYSTR |
Source: mobsync.exe |
String found in binary or memory: Remcos_Mutex_Inj |
Source: mobsync.exe, 00000005.00000002.937782591.0000000000400000.00000040.00000001.sdmp |
String found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicence_code.txtSoftware\WDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceUserAccess level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\SETTINGSoverridepth_unenc3.1.5 Prov| |
Source: mobsync.exe |
String found in binary or memory: Remcos_Mutex_Inj |
Source: mobsync.exe, 00000016.00000002.825096146.0000000000400000.00000040.00000001.sdmp |
String found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicence_code.txtSoftware\WDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceUserAccess level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\SETTINGSoverridepth_unenc3.1.5 Prov| |
Source: secinit.exe, 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp |
String found in binary or memory: Remcos_Mutex_Inj |
Source: secinit.exe, 0000001A.00000002.850111414.0000000000400000.00000040.00000001.sdmp |
String found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicence_code.txtSoftware\WDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceUserAccess level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\SETTINGSoverridepth_unenc3.1.5 Prov| |