Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetProcAddress |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: LoadLibraryA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: lstrcatA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: OpenEventA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CreateEventA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CloseHandle |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Sleep |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetUserDefaultLangID |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: VirtualAllocExNuma |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: VirtualFree |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetSystemInfo |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: VirtualAlloc |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: HeapAlloc |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetComputerNameA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: lstrcpyA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetProcessHeap |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetCurrentProcess |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: lstrlenA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ExitProcess |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GlobalMemoryStatusEx |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetSystemTime |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SystemTimeToFileTime |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: advapi32.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: gdi32.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: user32.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: crypt32.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ntdll.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetUserNameA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CreateDCA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetDeviceCaps |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ReleaseDC |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CryptStringToBinaryA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sscanf |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: VMwareVMware |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: HAL9TH |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: JohnDoe |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: DISPLAY |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: default4 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetEnvironmentVariableA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetFileAttributesA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GlobalLock |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: HeapFree |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetFileSize |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GlobalSize |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CreateToolhelp32Snapshot |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: IsWow64Process |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Process32Next |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetLocalTime |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: FreeLibrary |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetTimeZoneInformation |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetSystemPowerStatus |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetVolumeInformationA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetWindowsDirectoryA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Process32First |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetLocaleInfoA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetUserDefaultLocaleName |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetModuleFileNameA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: DeleteFileA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: FindNextFileA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: LocalFree |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: FindClose |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SetEnvironmentVariableA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: LocalAlloc |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetFileSizeEx |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ReadFile |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SetFilePointer |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: WriteFile |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CreateFileA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: FindFirstFileA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CopyFileA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: VirtualProtect |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetLogicalProcessorInformationEx |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetLastError |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: lstrcpynA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: MultiByteToWideChar |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GlobalFree |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: WideCharToMultiByte |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GlobalAlloc |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: OpenProcess |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: TerminateProcess |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetCurrentProcessId |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: gdiplus.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ole32.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: bcrypt.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: wininet.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: shlwapi.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: shell32.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: psapi.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: rstrtmgr.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CreateCompatibleBitmap |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SelectObject |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: BitBlt |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: DeleteObject |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CreateCompatibleDC |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdipGetImageEncodersSize |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdipGetImageEncoders |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdipCreateBitmapFromHBITMAP |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdiplusStartup |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdiplusShutdown |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdipSaveImageToStream |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdipDisposeImage |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GdipFree |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetHGlobalFromStream |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CreateStreamOnHGlobal |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CoUninitialize |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CoInitialize |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CoCreateInstance |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: BCryptGenerateSymmetricKey |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: BCryptCloseAlgorithmProvider |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: BCryptDecrypt |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: BCryptSetProperty |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: BCryptDestroyKey |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: BCryptOpenAlgorithmProvider |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetWindowRect |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetDesktopWindow |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetDC |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CloseWindow |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: wsprintfA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: EnumDisplayDevicesA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetKeyboardLayoutList |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CharToOemW |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: wsprintfW |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RegQueryValueExA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RegEnumKeyExA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RegOpenKeyExA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RegCloseKey |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RegEnumValueA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CryptBinaryToStringA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CryptUnprotectData |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SHGetFolderPathA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ShellExecuteExA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: InternetOpenUrlA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: InternetConnectA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: InternetCloseHandle |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: InternetOpenA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: HttpSendRequestA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: HttpOpenRequestA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: InternetReadFile |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: InternetCrackUrlA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: StrCmpCA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: StrStrA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: StrCmpCW |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: PathMatchSpecA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: GetModuleFileNameExA |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RmStartSession |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RmRegisterResources |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RmGetList |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: RmEndSession |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_open |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_prepare_v2 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_step |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_column_text |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_finalize |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_close |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_column_bytes |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3_column_blob |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: encrypted_key |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: PK11SDR_Decrypt |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: browser: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: profile: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: login: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: password: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Opera |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: OperaGX |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Network |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: cookies |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: FALSE |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: autofill |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SELECT name, value FROM autofill |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: history |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SELECT url FROM urls LIMIT 1000 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: month: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Cookies |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Login Data |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: History |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: logins.json |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: formSubmitURL |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: usernameField |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: encryptedUsername |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: encryptedPassword |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: formhistory.sqlite |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SELECT fieldname, value FROM moz_formhistory |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SELECT url FROM moz_places LIMIT 1000 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: cookies.sqlite |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: places.sqlite |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: plugins |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Local Extension Settings |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: IndexedDB |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Opera Stable |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Opera GX Stable |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: CURRENT |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: chrome-extension_ |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Local State |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: profiles.ini |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: chrome |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: opera |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: firefox |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: wallets |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ProductName |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: DisplayName |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ProcessorNameString |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: DisplayVersion |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Network Info: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: System Summary: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Installed Apps: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Current User: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Process List: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: system_info.txt |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: freebl3.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: mozglue.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: msvcp140.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: softokn3.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: vcruntime140.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: runas |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: files |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: D877F783D5D3EF8C* |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: A7FDF864FBC10B77* |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: A92DAA6EA6F891F2* |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: F8806DD0C461824F* |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Telegram |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Password |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Pidgin |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: accounts.xml |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: dQw4w9WgXcQ |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: config.vdf |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: 00000001 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: 00000002 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: 00000003 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: 00000004 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: token: |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Software\Valve\Steam |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: SteamPath |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: DialogConfig.vdf |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: DialogConfigOverlay*.vdf |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: libraryfolders.vdf |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: loginusers.vdf |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: sqlite3.dll |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: browsers |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: https |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Content-Type: multipart/form-data; boundary=---- |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: Content-Disposition: form-data; name=" |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: build |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: token |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: message |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 |
Source: 26.2.nsuAC75.tmp.exe.400000.0.unpack | String decryptor: screenshot.jpg |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://archive.org/details/archive.org_bot)Mozilla/5.0 |
Source: explorer.exe, 00000002.00000000.1401121668.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1401121668.000000000952D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: explorer.exe, 00000002.00000000.1401121668.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1401121668.000000000952D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: explorer.exe, 00000002.00000000.1401121668.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1401121668.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1401121668.0000000009519000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://devlog.gregarius.net/docs/ua)Links |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://grub.org)Mozilla/5.0 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)SonyEricssonK550i/R1JD |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://invalidlog.txtlookup |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://localhost:3433/https://duniadekho.baridna: |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://misc.yahoo.com.cn/help.html)QueryPerformanceFrequency |
Source: explorer.exe, 00000002.00000000.1401121668.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1401121668.000000000952D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: explorer.exe, 00000002.00000000.1398152644.000000000305D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di |
Source: explorer.exe, 00000002.00000000.1400138185.0000000007AF0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.1397922890.0000000002C00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.1400153686.0000000007B10000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://search.msn.com/msnbot.htm)msnbot/1.1 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://search.msn.com/msnbot.htm)net/http: |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://search.msn.com/msnbot.htm)pkcs7: |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.oniontls: |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.alexa.com/help/webmasters; |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.alltheweb.com/help/webmaster/crawler)Mozilla/5.0 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.archive.org/details/archive.org_bot)Opera/9.80 |
Source: explorer.exe, 00000002.00000000.1399234102.00000000070CE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.avantbrowser.com)MOT-V9mm/ |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.baidu.com/search/spider.htm)MobileSafari/600.1.4 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.bloglines.com)Frame |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.everyfeed.com)explicit |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.exabot.com/go/robot)Opera/9.80 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.google.c |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.google.com/bot.html)Mozilla/5.0 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.google.com/bot.html)crypto/ecdh: |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.google.com/feedfetcher.html)HKLM |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.googlebot.com/bot.html)Links |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://www.spidersoft.com) |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://yandex.com/bots)Opera |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: http://yandex.com/bots)Opera/9.51 |
Source: explorer.exe, 00000002.00000000.1403829585.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppin |
Source: explorer.exe, 00000002.00000000.1403829585.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://android.notify.windows.com/iOS |
Source: explorer.exe, 00000002.00000000.1401121668.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/$ |
Source: explorer.exe, 00000002.00000000.1401121668.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/X |
Source: explorer.exe, 00000002.00000000.1397371484.00000000008DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1398152644.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: explorer.exe, 00000002.00000000.1401121668.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows? |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=C2BB6DDCE8D847D6B779FE8AEC27D161&timeOut=5000&oc |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1398152644.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows? |
Source: explorer.exe, 00000002.00000000.1401121668.0000000009390000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://arc.msn.comWzE |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: https://blockchain.infoindex |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: https://blockstream.info/apiinva |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: https://cdn.discordapp.com/attachments/1088058556286251082/1111230812579450950/TsgVtmYNoFT.zipMozill |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark |
Source: explorer.exe, 00000002.00000000.1403829585.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.comE |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: https://github.com/Snawoot/opera-proxy/releases/download/v1.2.2/opera-proxy.windows-386.exeBlackBerr |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15G9PH.img |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hJkDs.img |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img |
Source: explorer.exe, 00000002.00000000.1403829585.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.comNaP0B |
Source: explorer.exe, 00000002.00000000.1403829585.000000000CFF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comcemberZ |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: https://raw.githubusercontent.com/spesmilo/electrum/master/electrum/servers.jsonsize |
Source: 83BC.exe, 00000006.00000003.2792254345.00000000029BD000.00000004.00000020.00020000.00000000.sdmp, 83BC.exe, 00000006.00000003.2777166580.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, 83BC.exe, 00000006.00000003.2777583545.0000000003719000.00000004.00000020.00020000.00000000.sdmp, 83BC.exe, 00000006.00000003.2890107185.00000000029BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sabotage.net |
Source: 288c47bbc1871b439df19ff4df68f076.exe | String found in binary or memory: https://turnitin.com/robot/crawlerinfo.html)cannot |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000002.00000000.1401737978.0000000009724000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://wns.windows.com/bat |
Source: explorer.exe, 00000002.00000000.1403829585.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.com576 |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/health/wellness/7-secrets-to-a-happy-old-age-backed-by-science/ss-AA1hwpvW |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/companies/legacy-park-auction-canceled-liquidation-proposed-here-s-w |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/realestate/my-husband-and-i-paid-off-our-mortgage-more-than-15-years |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in- |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/crime/one-dead-several-wounded-after-drive-by-shootings-in-south-la/a |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/opinion/decline-of-decorum-21-essential-manners-today-s-parents-fail- |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/california-workers-will-get-five-sick-days-instead-of-three- |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/world/pastor-of-atlanta-based-megachurch-faces-backlash-after-controv |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-does-worry-house-drama-will-impact- |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com:443/en-us/feed |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00403383 | 0_2_00403383 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041784F | 0_2_0041784F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041844F | 0_2_0041844F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042D803 | 0_2_0042D803 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00417C23 | 0_2_00417C23 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041802F | 0_2_0041802F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042E0EE | 0_2_0042E0EE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0040F903 | 0_2_0040F903 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043053F | 0_2_0043053F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042CD94 | 0_2_0042CD94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042DE73 | 0_2_0042DE73 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042BECE | 0_2_0042BECE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042D2BF | 0_2_0042D2BF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041737A | 0_2_0041737A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042E3F3 | 0_2_0042E3F3 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0041784F | 4_2_0041784F |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0041844F | 4_2_0041844F |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0042D803 | 4_2_0042D803 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_00417C23 | 4_2_00417C23 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0041802F | 4_2_0041802F |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0042E0EE | 4_2_0042E0EE |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0040F903 | 4_2_0040F903 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0043053F | 4_2_0043053F |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0042CD94 | 4_2_0042CD94 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0042DE73 | 4_2_0042DE73 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0042BECE | 4_2_0042BECE |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0042D2BF | 4_2_0042D2BF |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0041737A | 4_2_0041737A |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: 4_2_0042E3F3 | 4_2_0042E3F3 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D905B | 5_2_005D905B |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_0041787A | 5_2_0041787A |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_0041894F | 5_2_0041894F |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_00418123 | 5_2_00418123 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D89EB | 5_2_005D89EB |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D92D6 | 5_2_005D92D6 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_0040FAF6 | 5_2_0040FAF6 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D6B9B | 5_2_005D6B9B |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_0040A3B7 | 5_2_0040A3B7 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D84A7 | 5_2_005D84A7 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_00417D4F | 5_2_00417D4F |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_0040356E | 5_2_0040356E |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_0040A50D | 5_2_0040A50D |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_0041852F | 5_2_0041852F |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D95DB | 5_2_005D95DB |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D9D9F | 5_2_005D9D9F |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_00404D8B | 5_2_00404D8B |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005DC65B | 5_2_005DC65B |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_005D7F7C | 5_2_005D7F7C |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: 5_2_00414FC8 | 5_2_00414FC8 |
Source: 26.2.nsuAC75.tmp.exe.2250e67.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks |
Source: 7.0.9561.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector |
Source: 0000000F.00000002.1876773105.0000000001F61000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 0000000F.00000002.1863090998.0000000000470000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 0000001A.00000002.2605092891.0000000002250000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000000.00000002.1414909359.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000004.00000002.1677531544.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000004.00000002.1677336992.0000000000498000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000008.00000002.4107945303.00000000030F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000000.00000002.1414773059.0000000000609000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000000.00000002.1414691831.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000004.00000002.1677390187.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000017.00000002.4106141741.0000000002F10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000000.00000002.1414674284.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 0000001A.00000002.2604597299.0000000000728000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000008.00000002.4107329248.0000000002CF4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000004.00000002.1677220887.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000017.00000002.4104489388.0000000002B0C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 0000000D.00000002.1778201107.000000000084C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000005.00000002.1708502854.0000000002318000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: C:\Users\user\AppData\Local\Temp\9561.exe, type: DROPPED | Matched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\gferuhf C:\Users\user\AppData\Roaming\gferuhf | |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\83BC.exe C:\Users\user\AppData\Local\Temp\83BC.exe | |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Process created: C:\Users\user\AppData\Local\Temp\83BC.exe C:\Users\user\AppData\Local\Temp\83BC.exe | |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\9561.exe C:\Users\user\AppData\Local\Temp\9561.exe | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process created: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe "C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe" | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process created: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe "C:\Users\user\AppData\Local\Temp\InstallSetup9.exe" | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process created: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe "C:\Users\user\AppData\Local\Temp\InstallSetup9.exe" | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process created: C:\Users\user\AppData\Local\Temp\toolspub2.exe "C:\Users\user\AppData\Local\Temp\toolspub2.exe" | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process created: C:\Users\user\AppData\Local\Temp\BroomSetup.exe C:\Users\user\AppData\Local\Temp\BroomSetup.exe | |
Source: C:\Users\user\AppData\Local\Temp\toolspub2.exe | Process created: C:\Users\user\AppData\Local\Temp\toolspub2.exe "C:\Users\user\AppData\Local\Temp\toolspub2.exe" | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\fodhelper.exe fodhelper | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" | |
Source: C:\Windows\System32\fodhelper.exe | Process created: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe "C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe" | |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\B137.exe C:\Users\user\AppData\Local\Temp\B137.exe | |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | Process created: C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp "C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp" /SL5="$30510,4192226,54272,C:\Users\user\AppData\Local\Temp\B137.exe" | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process created: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\regsvr32.exe regsvr32 /s C:\Users\user\AppData\Local\Temp\C1C2.dll | |
Source: C:\Windows\System32\regsvr32.exe | Process created: C:\Windows\SysWOW64\regsvr32.exe /s C:\Users\user\AppData\Local\Temp\C1C2.dll | |
Source: unknown | Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | |
Source: C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp | Process created: C:\Users\user\AppData\Local\Temp\B137.exe "C:\Users\user\AppData\Local\Temp\B137.exe" /SPAWNWND=$404C0 /NOTIFYWND=$30510 | |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\CDAA.exe C:\Users\user\AppData\Local\Temp\CDAA.exe | |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe | |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | Process created: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp "C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp" /SL5="$205C2,4192226,54272,C:\Users\user\AppData\Local\Temp\B137.exe" /SPAWNWND=$404C0 /NOTIFYWND=$30510 | |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" helpmsg 28 | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process created: C:\Program Files (x86)\CPointASP\cpointasp.exe "C:\Program Files (x86)\CPointASP\cpointasp.exe" -i | |
Source: C:\Windows\SysWOW64\net.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\net.exe | Process created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 helpmsg 28 | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -nologo -noprofile | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process created: C:\Program Files (x86)\CPointASP\cpointasp.exe "C:\Program Files (x86)\CPointASP\cpointasp.exe" -s | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\83BC.exe C:\Users\user\AppData\Local\Temp\83BC.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\9561.exe C:\Users\user\AppData\Local\Temp\9561.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\B137.exe C:\Users\user\AppData\Local\Temp\B137.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\regsvr32.exe regsvr32 /s C:\Users\user\AppData\Local\Temp\C1C2.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Users\user\AppData\Local\Temp\CDAA.exe C:\Users\user\AppData\Local\Temp\CDAA.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Process created: C:\Users\user\AppData\Local\Temp\83BC.exe C:\Users\user\AppData\Local\Temp\83BC.exe | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process created: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe "C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe" | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process created: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe "C:\Users\user\AppData\Local\Temp\InstallSetup9.exe" | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process created: C:\Users\user\AppData\Local\Temp\toolspub2.exe "C:\Users\user\AppData\Local\Temp\toolspub2.exe" | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process created: C:\Users\user\AppData\Local\Temp\BroomSetup.exe C:\Users\user\AppData\Local\Temp\BroomSetup.exe | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process created: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | |
Source: C:\Users\user\AppData\Local\Temp\toolspub2.exe | Process created: C:\Users\user\AppData\Local\Temp\toolspub2.exe "C:\Users\user\AppData\Local\Temp\toolspub2.exe" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\fodhelper.exe fodhelper | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" | |
Source: C:\Windows\System32\fodhelper.exe | Process created: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe "C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe" | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -nologo -noprofile | |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | Process created: C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp "C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp" /SL5="$30510,4192226,54272,C:\Users\user\AppData\Local\Temp\B137.exe" | |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\regsvr32.exe | Process created: C:\Windows\SysWOW64\regsvr32.exe /s C:\Users\user\AppData\Local\Temp\C1C2.dll | |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | Process created: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp "C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp" /SL5="$205C2,4192226,54272,C:\Users\user\AppData\Local\Temp\B137.exe" /SPAWNWND=$404C0 /NOTIFYWND=$30510 | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" helpmsg 28 | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process created: C:\Program Files (x86)\CPointASP\cpointasp.exe "C:\Program Files (x86)\CPointASP\cpointasp.exe" -i | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process created: C:\Program Files (x86)\CPointASP\cpointasp.exe "C:\Program Files (x86)\CPointASP\cpointasp.exe" -s | |
Source: C:\Windows\SysWOW64\net.exe | Process created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 helpmsg 28 | |
Source: file.exe | Static PE information: section name: .jiwe |
Source: 83BC.exe.2.dr | Static PE information: section name: .venowe |
Source: C1C2.dll.2.dr | Static PE information: section name: b=W| |
Source: C1C2.dll.2.dr | Static PE information: section name: Lny6jo2 |
Source: CDAA.exe.2.dr | Static PE information: section name: .AVI; |
Source: CDAA.exe.2.dr | Static PE information: section name: .AVI; |
Source: CDAA.exe.2.dr | Static PE information: section name: .EXE |
Source: CDAA.exe.2.dr | Static PE information: section name: .EXE |
Source: CDAA.exe.2.dr | Static PE information: section name: .EXE |
Source: E297.exe.2.dr | Static PE information: section name: .corugim |
Source: 973D.exe.2.dr | Static PE information: section name: .vmp |
Source: 973D.exe.2.dr | Static PE information: section name: .vmp |
Source: 973D.exe.2.dr | Static PE information: section name: .vmp |
Source: 3205.exe.2.dr | Static PE information: section name: .AVI; |
Source: 3205.exe.2.dr | Static PE information: section name: .AVI; |
Source: 3205.exe.2.dr | Static PE information: section name: .vmp |
Source: 3205.exe.2.dr | Static PE information: section name: .vmp |
Source: 3205.exe.2.dr | Static PE information: section name: .vmp |
Source: tieruhf.2.dr | Static PE information: section name: .zona |
Source: gferuhf.2.dr | Static PE information: section name: .jiwe |
Source: csrss.exe.6.dr | Static PE information: section name: .venowe |
Source: 288c47bbc1871b439df19ff4df68f076.exe.7.dr | Static PE information: section name: .viji |
Source: toolspub2.exe.7.dr | Static PE information: section name: .zona |
Source: BroomSetup.exe.12.dr | Static PE information: section name: .didata |
Source: syncUpd[1].exe.12.dr | Static PE information: section name: .wasubiy |
Source: nsuAC75.tmp.exe.12.dr | Static PE information: section name: .wasubiy |
Source: freebl3.dll.26.dr | Static PE information: section name: .00cfg |
Source: freebl3[1].dll.26.dr | Static PE information: section name: .00cfg |
Source: mozglue.dll.26.dr | Static PE information: section name: .00cfg |
Source: mozglue[1].dll.26.dr | Static PE information: section name: .00cfg |
Source: msvcp140.dll.26.dr | Static PE information: section name: .didat |
Source: msvcp140[1].dll.26.dr | Static PE information: section name: .didat |
Source: nss3.dll.26.dr | Static PE information: section name: .00cfg |
Source: nss3[1].dll.26.dr | Static PE information: section name: .00cfg |
Source: softokn3.dll.26.dr | Static PE information: section name: .00cfg |
Source: softokn3[1].dll.26.dr | Static PE information: section name: .00cfg |
Source: cpointasp.exe.37.dr | Static PE information: section name: _text_9 |
Source: is-01D6N.tmp.37.dr | Static PE information: section name: |
Source: is-01D6N.tmp.37.dr | Static PE information: section name: |
Source: is-01D6N.tmp.37.dr | Static PE information: section name: petite |
Source: is-LJEF3.tmp.37.dr | Static PE information: section name: |
Source: is-LJEF3.tmp.37.dr | Static PE information: section name: petite |
Source: is-9SQN6.tmp.37.dr | Static PE information: section name: |
Source: is-9SQN6.tmp.37.dr | Static PE information: section name: |
Source: is-9SQN6.tmp.37.dr | Static PE information: section name: petite |
Source: is-1TTMQ.tmp.37.dr | Static PE information: section name: |
Source: is-1TTMQ.tmp.37.dr | Static PE information: section name: |
Source: is-1TTMQ.tmp.37.dr | Static PE information: section name: petite |
Source: is-7TH98.tmp.37.dr | Static PE information: section name: |
Source: is-7TH98.tmp.37.dr | Static PE information: section name: petite |
Source: is-7QIAL.tmp.37.dr | Static PE information: section name: |
Source: is-7QIAL.tmp.37.dr | Static PE information: section name: |
Source: is-7QIAL.tmp.37.dr | Static PE information: section name: |
Source: is-9JRC1.tmp.37.dr | Static PE information: section name: |
Source: is-9JRC1.tmp.37.dr | Static PE information: section name: |
Source: is-9JRC1.tmp.37.dr | Static PE information: section name: petite |
Source: is-VT3M5.tmp.37.dr | Static PE information: section name: |
Source: is-VT3M5.tmp.37.dr | Static PE information: section name: |
Source: is-VT3M5.tmp.37.dr | Static PE information: section name: |
Source: is-4CSOT.tmp.37.dr | Static PE information: section name: |
Source: is-4CSOT.tmp.37.dr | Static PE information: section name: |
Source: is-4CSOT.tmp.37.dr | Static PE information: section name: petite |
Source: is-7RFNU.tmp.37.dr | Static PE information: section name: |
Source: is-7RFNU.tmp.37.dr | Static PE information: section name: |
Source: is-7RFNU.tmp.37.dr | Static PE information: section name: petite |
Source: is-KS29E.tmp.37.dr | Static PE information: section name: |
Source: is-KS29E.tmp.37.dr | Static PE information: section name: |
Source: is-KS29E.tmp.37.dr | Static PE information: section name: |
Source: is-EJ9G2.tmp.37.dr | Static PE information: section name: |
Source: is-EJ9G2.tmp.37.dr | Static PE information: section name: |
Source: is-EJ9G2.tmp.37.dr | Static PE information: section name: petite |
Source: is-0U1TM.tmp.37.dr | Static PE information: section name: /4 |
Source: is-HRFH2.tmp.37.dr | Static PE information: section name: /4 |
Source: is-AO7D9.tmp.37.dr | Static PE information: section name: /4 |
Source: is-VRA2K.tmp.37.dr | Static PE information: section name: |
Source: is-VRA2K.tmp.37.dr | Static PE information: section name: |
Source: is-VRA2K.tmp.37.dr | Static PE information: section name: |
Source: is-2458N.tmp.37.dr | Static PE information: section name: /4 |
Source: is-040AJ.tmp.37.dr | Static PE information: section name: .eh_fram |
Source: is-1V3O7.tmp.37.dr | Static PE information: section name: asmcode |
Source: is-AU9HG.tmp.37.dr | Static PE information: section name: .eh_fram |
Source: is-KDLQ5.tmp.37.dr | Static PE information: section name: /4 |
Source: is-GE7OO.tmp.37.dr | Static PE information: section name: /4 |
Source: is-NEGHU.tmp.37.dr | Static PE information: section name: /4 |
Source: is-KBFH3.tmp.37.dr | Static PE information: section name: /4 |
Source: is-EFHJ3.tmp.37.dr | Static PE information: section name: .trace |
Source: is-EFHJ3.tmp.37.dr | Static PE information: section name: _RDATA |
Source: is-EFHJ3.tmp.37.dr | Static PE information: section name: .debug_o |
Source: is-II7SF.tmp.37.dr | Static PE information: section name: /4 |
Source: is-DER7H.tmp.37.dr | Static PE information: section name: /4 |
Source: is-B87EH.tmp.37.dr | Static PE information: section name: /4 |
Source: is-P9QDC.tmp.37.dr | Static PE information: section name: /4 |
Source: is-93FRL.tmp.37.dr | Static PE information: section name: /4 |
Source: is-G4UPE.tmp.37.dr | Static PE information: section name: /4 |
Source: is-HHJJI.tmp.37.dr | Static PE information: section name: /4 |
Source: is-IOMGH.tmp.37.dr | Static PE information: section name: /4 |
Source: is-K0GP7.tmp.37.dr | Static PE information: section name: .sxdata |
Source: is-F3LHF.tmp.37.dr | Static PE information: section name: .didata |
Source: JSCoreService75.exe.40.dr | Static PE information: section name: _text_9 |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\freebl3[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | File created: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bass_fx.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\unins000.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-7RFNU.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\msvcp140[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | File created: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bass_tta.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\uchardet.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-VRA2K.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\is-IOMGH.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\tak_deco_lib.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\vcruntime140[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ONMZACOW\syncUpd[1].exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-DER7H.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-G4UPE.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\libsoxr.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-RRNMJ.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-II7SF.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\peak_scanner_plugin_c.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\ProgramData\nss3.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bassdsd.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Users\user\AppData\Local\Temp\is-5KKD2.tmp\_isetup\_setup64.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\dstt.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | File created: C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-GE7OO.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-NEGHU.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\raw_decode_plugin_c.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\mozglue[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\ff_helper.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bassflac.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-AU9HG.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-ODNC4.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-4CSOT.tmp | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\9561.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-F3LHF.tmp | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\C1C2.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bassalac.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-KS29E.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\libwinpthread-1.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\basscd.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\ProgramData\msvcp140.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-0U1TM.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-P9QDC.tmp | Jump to dropped file |
Source: C:\Program Files (x86)\CPointASP\cpointasp.exe | File created: C:\ProgramData\JSCoreService75\JSCoreService75.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | File created: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-GR811.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\ProgramData\vcruntime140.dll | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\E297.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Users\user\AppData\Local\Temp\is-5KKD2.tmp\_isetup\_shfoldr.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\OptimFROG.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-93FRL.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\is-UK3TA.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Users\user\AppData\Local\Temp\is-5KKD2.tmp\_isetup\_RegDLL.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\libwebp.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-2458N.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-7QIAL.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\wavpackdll.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\daiso.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-1TTMQ.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-KBFH3.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\da.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\ProgramData\mozglue.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-040AJ.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-7TH98.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-9SQN6.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\dsd2.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bassmix.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bassopus.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\sd.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\cpointasp.exe | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\CDAA.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | File created: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bassape.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Users\user\AppData\Local\Temp\is-5KKD2.tmp\_isetup\_iscrypt.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | File created: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\ProgramData\softokn3.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-AVN6H.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\is-HHJJI.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\libFLAC_dynamic.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-AO7D9.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\takdec.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\utils.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\pcm2dsd.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-9JRC1.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-01D6N.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\7z.exe (copy) | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\83BC.exe | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\973D.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\lame_enc.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\ProgramData\freebl3.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\gain_analysis.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\mp3gain.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\d_writer.dll (copy) | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\B137.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | File created: C:\ProgramData\Drivers\csrss.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | File created: C:\Users\user\AppData\Local\Temp\nsbA38B.tmp\INetC.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\softokn3[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\basswma.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\basswv.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\libdtsdec.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-2CL5A.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\nss3[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-EFHJ3.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-1V3O7.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-VT3M5.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-HRFH2.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | File created: C:\Users\user\AppData\Local\Temp\toolspub2.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\dsd2pcmt.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-KDLQ5.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\rg_ebur128.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-LJEF3.tmp | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Local\Temp\3205.exe | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Roaming\tieruhf | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bassmidi.dll (copy) | Jump to dropped file |
Source: C:\Windows\explorer.exe | File created: C:\Users\user\AppData\Roaming\gferuhf | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-B87EH.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\bass_ofr.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-K0GP7.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | File created: C:\Program Files (x86)\CPointASP\bin\x86\is-EJ9G2.tmp | Jump to dropped file |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\InstallSetup9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\BroomSetup.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\cmd.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-3QNR8.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\B137.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\freebl3[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bass_fx.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\unins000.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-7RFNU.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\msvcp140[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\uchardet.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bass_tta.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-VRA2K.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\is-IOMGH.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\tak_deco_lib.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\vcruntime140[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-G4UPE.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-DER7H.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\libsoxr.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-RRNMJ.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-II7SF.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\peak_scanner_plugin_c.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bassdsd.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5KKD2.tmp\_isetup\_setup64.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\dstt.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-GE7OO.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-NEGHU.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\raw_decode_plugin_c.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\mozglue[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\ff_helper.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bassflac.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-AU9HG.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-ODNC4.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-4CSOT.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-F3LHF.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bassalac.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\libwinpthread-1.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-KS29E.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\basscd.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-0U1TM.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-P9QDC.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-GR811.tmp | Jump to dropped file |
Source: C:\Windows\explorer.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\E297.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5KKD2.tmp\_isetup\_shfoldr.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\OptimFROG.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-93FRL.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\is-UK3TA.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5KKD2.tmp\_isetup\_RegDLL.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\libwebp.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-2458N.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-7QIAL.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\daiso.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\wavpackdll.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-1TTMQ.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-KBFH3.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\da.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-040AJ.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-7TH98.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-9SQN6.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\dsd2.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bassmix.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bassopus.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\sd.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bassape.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\ProgramData\softokn3.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-AVN6H.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\libFLAC_dynamic.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\plugins\internal\is-HHJJI.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-AO7D9.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\takdec.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\utils.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\pcm2dsd.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-9JRC1.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-01D6N.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\7z.exe (copy) | Jump to dropped file |
Source: C:\Windows\explorer.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\973D.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\lame_enc.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\ProgramData\freebl3.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\gain_analysis.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\mp3gain.exe (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\d_writer.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\softokn3[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\basswma.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\libdtsdec.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\basswv.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-2CL5A.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-EFHJ3.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GIBVL2EB\nss3[1].dll | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-1V3O7.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-VT3M5.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-HRFH2.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\dsd2pcmt.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-KDLQ5.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\rg_ebur128.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-LJEF3.tmp | Jump to dropped file |
Source: C:\Windows\explorer.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\3205.exe | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bassmidi.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-B87EH.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\bass_ofr.dll (copy) | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-K0GP7.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\is-ADVE0.tmp\B137.tmp | Dropped PE file which has not been started: C:\Program Files (x86)\CPointASP\bin\x86\is-EJ9G2.tmp | Jump to dropped file |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: sbvmx86write B -> Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util%s.exe%s.sys%s: %s(...) , i = , not , val -BEFV--DYOR--FMLD--FZTA--IRXC--JFQI--JQGP--JSKV--JZUF--KGQJ--KSFO--MKND--MOHU--NSFS--P |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: psapi.dllquestionsreboot inrecover: reflect: rwxrwxrwxscavtracestackpoolsucceededtask %+v tracebackunderflowunhandleduninstallunzip Torunzip: %wurn:uuid:w3m/0.5.1wbufSpanswebsocketxenevtchn} stack=[ netGo = MB goal, flushGen for type gfreecnt= heapGoal= p |
Source: explorer.exe, 00000002.00000000.1401737978.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 1efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000000.1401121668.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: STAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHostJulyJuneLEAFLisuMiaoModiNZDTNZSTNameNewaPINGPOSTPathQEMUROOTSASTSTARSendStatTempThaiTypeUUID"%s"\rss\smb\u00 %+v m=] = ] n=allgallparchasn1avx2basebindbitsbmi1bmi2boolcallcap cas1cas2cas3ca |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: uint64unuseduptimevmhgfsvmxnetvpc-s3wup_hsxennetxensvcxenvdb %v=%v, (conn) (scan (scan) MB in Value> allocs dying= flags= len=%d locks= m->g0= nmsys= pad1= pad2= s=nil text= zombie$WINDIR% CPU (%03d %s%v: %#x, goid=, j0 = -nologo/delete19531252.5.4.32.5. |
Source: explorer.exe, 00000002.00000000.1401737978.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}? |
Source: explorer.exe, 00000002.00000000.1401121668.000000000952D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: ersexpiresfloat32float64forcegcgctracehead = http://invalidlog.txtlookup messageminpc= nil keynop -> number pacer: panic: readdirrefererrefreshrequestrunningserial:server=signal svc_versyscalltor.exetraileruintptrunknownupgradeversionvmmousevpcuhubwaitingwindo |
Source: 83BC.exe, 00000006.00000003.3002366055.00000000035A4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: MIGJAoGBAJtcCCBEuPXqEMu2rREZdSYB+1TY6HE/BWrbN1/ZfMwxUulfEocqfD/3 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: popcntrdtscpreadatreasonremoverenamereturnrun-v3rune1 secondselectsendtoserversocketsocks socks5statusstringstructsweep sysmontelnettimersuint16uint32uint64unuseduptimevmhgfsvmxnetvpc-s3wup_hsxennetxensvcxenvdb %v=%v, (conn) (scan (scan) MB in Value> allocs |
Source: explorer.exe, 00000002.00000000.1401121668.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000 |
Source: 83BC.exe, 00000006.00000003.3002366055.00000000035A4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: MIGJAoGBAMZvmci/v9lu2mS+O/M3cUaAMvMrIOsTCKVWdgTHvKYn6UHCdNCgnztj |
Source: 83BC.exe, 00000006.00000003.2953201125.00000000035AB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: id ed25519 5uD7nVmCI5DppHHtx2H+7AzbTP39/UvAQinqkc/a/lg |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: pclmulqdqpreemptedprintableprofBlockprotocol proxy.exepsapi.dllquestionsreboot inrecover: reflect: rwxrwxrwxscavtracestackpoolsucceededtask %+v tracebackunderflowunhandleduninstallunzip Torunzip: %wurn:uuid:w3m/0.5.1wbufSpanswebsocketxenevtchn} stack=[ netGo |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: sse41sse42ssse3sudogsweeptext/tls: torrctotaltraceuint8unameusageuser=utf-8valuevmusbvmx86write B -> Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util%s.exe%s.sys%s: %s(...) , i = , not , val -BE |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: LycianLydianMondayPADDEDPcaSvcPragmaRejangSCHED STREETServerStringSundaySyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UTC-09UTC-11VBoxSFWINDIRWanchoWinMonWinmonX25519Yezidi[]byte\??\%s\csrss\ufffd acceptactivechan<-closedcookiedirectdo |
Source: explorer.exe, 00000002.00000000.1397371484.00000000008DE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000o; |
Source: explorer.exe, 00000002.00000000.1401737978.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NXTbrVMWare |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: 4cas5cas6chandatedeaddialdoneermsetagethmfailfileflagfromftpsfuncgziphosthourhttpicmpidleigmpint8itabjsonkindlinkmdnsnullopenpathpipepop3quitreadrootsbrkseeksid=sizesmtpsse3tag:tcp4texttruetypeudp4uintunixuuidvaryvmcixn-- -%s (at ... MB, \" and got= max |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: rSetEndOfFileSetErrorModeSetStdHandleSora_SompengSyloti_NagriSysStringLenThread32NextTor mode setTransmitFileUnauthorizedUnlockFileExVBoxTray.exeVariantClearVirtualAllocVirtualQueryWinmon32.sysWinmon64.sysWintrust.dllX-ImforwardsX-Powered-By[[:^ascii:]]\/(\d+) |
Source: explorer.exe, 00000002.00000000.1401121668.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: %SystemRoot%\system32\mswsock.dlldRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000 |
Source: 83BC.exe, 00000006.00000003.3013323672.00000000035AC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ntor-onion-key xagLdjTNZ7neGETsosZMKDpjlmHhhQLIVmCieMsBKW0 |
Source: explorer.exe, 00000002.00000000.1401737978.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: 3-512SOFTWARESaturdaySetEventSystem32TagbanwaTai_ThamTai_VietThursdayTifinaghTypeAAAATypeAXFRUSERHASHUSERNAMEUgariticVBoxWddmWSAIoctlWinmonFSWmiPrvSE[::1]:53[:word:][signal \\.\HGFS\\.\vmcistack=[_NewEnum_gatewayacceptexaddress bad instcgocheckcontinuecs |
Source: explorer.exe, 00000002.00000000.1398152644.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: ermsetagethmfailfileflagfromftpsfuncgziphosthourhttpicmpidleigmpint8itabjsonkindlinkmdnsnullopenpathpipepop3quitreadrootsbrkseeksid=sizesmtpsse3tag:tcp4texttruetypeudp4uintunixuuidvaryvmcixn-- -%s (at ... MB, \" and got= max= ms, ptr tab= top=%s %q%s |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: yreleasep: m=remote errorremoving appruntime: gp=runtime: sp=s ap traffics hs trafficself-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringstraffic/readtransmitfileulrichard.chunexpected )unknown portunknown typevmacthlp.exevmtoolsd.exewatchdo |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: sse3tag:tcp4texttruetypeudp4uintunixuuidvaryvmcixn-- -%s (at ... MB, \" and got= max= ms, ptr tab= top=%s %q%s %s%s*%d%s/%s%s:%d%s=%s"'&+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1.4.2156253.2.2500 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: RTP.exeSYSTEMROOT=SetFileTimeSignWritingSoft_DottedSystemDriveTTL expiredUninstallerVBoxServiceVMUSrvc.exeVariantInitVirtualFreeVirtualLockWSARecvFromWarang_CitiWhite_SpaceWinDefender[:^xdigit:]\dsefix.exeadditionalsalarm clockapplicationassistQueueauthorities |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: vmusbmousevmware: %wws2_32.dll of size (targetpc= , plugin: ErrCode=%v KiB work, bytes ... exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=$WINDIR\rss%!(BADPREC |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: sse42ssse3sudogsweeptext/tls: torrctotaltraceuint8unameusageuser=utf-8valuevmusbvmx86write B -> Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util%s.exe%s.sys%s: %s(...) , i = , not , val -BEFV--D |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: eUnprocessable EntityWinmonProcessMonitor\\.\pipe\VBoxTrayIPC^.*\._Ctype_uint8_t$asn1: syntax error: assigned stream ID 0bad font file formatbad system page sizebad use of bucket.bpbad use of bucket.mpcertificate requiredchan send (nil chan)close of nil channe |
Source: 83BC.exe, 00000006.00000003.2922332755.00000000035AD000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ntor-onion-key zeABkSC5U36c9jPkbqVUzrjd6qt+/Rti3yHGfsRtYhY |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: rdtscpreadatreasonremoverenamereturnrun-v3rune1 secondselectsendtoserversocketsocks socks5statusstringstructsweep sysmontelnettimersuint16uint32uint64unuseduptimevmhgfsvmxnetvpc-s3wup_hsxennetxensvcxenvdb %v=%v, (conn) (scan (scan) MB in Value> allocs dying= |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: potency-Key\System32\drivers\\.\VBoxMiniRdrDN os/exec.Command(^.*\._Ctype_char$bad TinySizeClasscouldn't dial: %wcouldn't find pidcouldn't get UUIDcouldn't get pidscouldn't hide PIDcpu name is emptycreate window: %wdecode server: %wdecryption faileddownload fi |
Source: explorer.exe, 00000002.00000000.1401121668.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 2VMware Virtual USB MouseJC:\Windows\System32\DDORes.dll,-2212 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: releasep: m=remote errorremoving appruntime: gp=runtime: sp=s ap traffics hs trafficself-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringstraffic/readtransmitfileulrichard.chunexpected )unknown portunknown typevmacthlp.exevmtoolsd.exewatchdog |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: lUnlockWINDOW_UPDATEWTSFreeMemoryWriteConsoleW[FrameHeader \\.\VBoxGuestaccept-rangesaccess deniedadvapi32.dll |
Source: 83BC.exe, 00000006.00000003.2953201125.00000000035AB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: MIGJAoGBALTKLm+Dn2//Wdsm4wVkqC6KdyxM64ihWRVmcinNdv7gngpzrQ45dqJm |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: MathPOSTALCODEParseAddr(ParseFloatPhoenicianProcessingPulseEventRIPEMD-160RST_STREAMResetEventSHA256-RSASHA384-RSASHA512-RSASYSTEMROOTSaurashtraSecureBootSet-CookieShowWindowTor uptimeUser-AgentVMSrvc.exeWSACleanupWSASocketWWSAStartupWget/1.9.1Windows 10Window |
Source: explorer.exe, 00000002.00000000.1399234102.0000000006F96000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: )d2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000000.1397371484.00000000008DE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000/; |
Source: explorer.exe, 00000002.00000000.1401737978.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000 |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: PalmyreneParseUintPatchTimePublisherReleaseDCRemoveAllSTUN addrSamaritanSee OtherSeptemberSundaneseSysnativeToo EarlyTrailer: TypeCNAMETypeHINFOTypeMINFOUse ProxyVBoxGuestVBoxMouseVBoxVideoWSASendToWednesdayWindows 7WriteFileZ07:00:00[%v = %d][:^word:][:alnum: |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: ssse3sudogsweeptext/tls: torrctotaltraceuint8unameusageuser=utf-8valuevmusbvmx86write B -> Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util%s.exe%s.sys%s: %s(...) , i = , not , val -BEFV--DYOR-- |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: bmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chandatedeaddialdoneermsetagethmfailfileflagfromftpsfuncgziphosthourhttpicmpidleigmpint8itabjsonkindlinkmdnsnullopenpathpipepop3quitreadrootsbrkseeksid=sizesmtpsse3tag:tcp4texttruetypeudp4uintunixuuidvaryvmcixn-- -% |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: ultX-Forwarded-For\\.\VBoxTrayIPC] morebuf={pc:accept-encodingaccept-languageadvertise erroragent is closedapplication/pdfasyncpreemptoffbad certificatebad trailer keybefore EfiGuardclass registredclient finishedcouldn't set AVcouldn't set sbdecode hash: %wdo |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: bmi2boolcallcap cas1cas2cas3cas4cas5cas6chandatedeaddialdoneermsetagethmfailfileflagfromftpsfuncgziphosthourhttpicmpidleigmpint8itabjsonkindlinkmdnsnullopenpathpipepop3quitreadrootsbrkseeksid=sizesmtpsse3tag:tcp4texttruetypeudp4uintunixuuidvaryvmcixn-- -%s (a |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: swsarecvwsasendwup_verxen: %wxennet6 bytes, data=%q etypes incr=%v is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= ping=%q pointer stack=[ status %!Month(%02d%02d%s %s:%d%s: 0x%x-cleanup2.5.4.102.5.4.112.5.4.1748828125?4#?'1#0AcceptExAccepted |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: too many linkstoo many userstorrc filenameunexpected EOFunknown code: unknown error unknown methodunknown mode: unreachable: unsafe.PointeruserArenaStatevirtualbox: %wvmwaretray.exevmwareuser.exewii libnup/1.0winapi error #window createdwork.full != 0xenservi |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: ddrmountvolmsvmmoufno anodeno-cacheno_proxypollDescreadfromrecvfromreflect.runnableruntime.rwmutexRrwmutexWscavengeshutdownstrconv.taskkilltor_modetraceBuftrigger=unixgramunknown(usernamevmmemctlvmx_svgawalk: %wwsaioctlwuauservx509sha1yuio.top (forced) B exp.) |
Source: 288c47bbc1871b439df19ff4df68f076.exe | Binary or memory string: rayCreateSafeArrayGetDimSafeArrayGetIIDSafeArrayUnlockScheduledUpdateSetCommTimeoutsSetSecurityInfoSetVolumeLabelWShellExecuteExWStringFromCLSIDStringFromGUID2TerminateThreadUnescaped quoteUninstallStringUnmapViewOfFileVBoxService.exeVPS.hsmiths.comWinsta0\Def |
Source: C:\Users\user\Desktop\file.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,_strcpy_s,__itoa_s, | 0_2_00415C13 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen, | 0_2_0041583D |
Source: C:\Users\user\Desktop\file.exe | Code function: __crtGetLocaleInfoA_stat, | 0_2_0041A8C9 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoA, | 0_2_0041A906 |
Source: C:\Users\user\Desktop\file.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 0_2_00415A83 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoA,GetLocaleInfoA,GetACP, | 0_2_0041568E |
Source: C:\Users\user\Desktop\file.exe | Code function: _strlen,EnumSystemLocalesA, | 0_2_00415B47 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_0041A756 |
Source: C:\Users\user\Desktop\file.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 0_2_00415B70 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_0041A73D |
Source: C:\Users\user\Desktop\file.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 0_2_00415BD7 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLastError,_malloc,WideCharToMultiByte,__freea,GetLocaleInfoA, | 0_2_0041A78A |
Source: C:\Users\user\Desktop\file.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 0_2_004157A5 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: __getptd,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,_strcpy_s,__itoa_s, | 4_2_00415C13 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen, | 4_2_0041583D |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: __crtGetLocaleInfoA_stat, | 4_2_0041A8C9 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: GetLocaleInfoA, | 4_2_0041A906 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 4_2_00415A83 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: GetLocaleInfoA,GetLocaleInfoA,GetACP, | 4_2_0041568E |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: _strlen,EnumSystemLocalesA, | 4_2_00415B47 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: GetLocaleInfoW, | 4_2_0041A756 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 4_2_00415B70 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: GetLocaleInfoW, | 4_2_0041A73D |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 4_2_00415BD7 |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: GetLastError,_malloc,WideCharToMultiByte,__freea,GetLocaleInfoA, | 4_2_0041A78A |
Source: C:\Users\user\AppData\Roaming\gferuhf | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 4_2_004157A5 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: _strlen,EnumSystemLocalesA, | 5_2_00416047 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 5_2_00416070 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 5_2_004160D7 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: GetLocaleInfoA, | 5_2_0041A943 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s, | 5_2_00416113 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: GetLocaleInfoA,GetLocaleInfoA,GetACP, | 5_2_00415B8E |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW, | 5_2_0041A444 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA, | 5_2_0041A478 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: GetLocaleInfoW, | 5_2_0041A42B |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 5_2_00415CA5 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen, | 5_2_00415D3D |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, | 5_2_00415DB1 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 5_2_0041A5B7 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 5_2_00415F83 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Code function: GetLocaleInfoA, | 5_2_0041B793 |
Source: C:\Users\user\AppData\Local\Temp\83BC.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\9561.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\9561.exe VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\\formhistory.sqlite |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite-shm |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\\logins.json |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite-wal |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite-shm |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\\cookies.sqlite |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\\places.sqlite |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001 |
Source: C:\Windows\SysWOW64\explorer.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\\cert9.db |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch |
Source: C:\Users\user\AppData\Local\Temp\nsuAC75.tmp.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite-wal |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\dtbqpus9.default\key4.db |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\\key4.db |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn |
Source: C:\Windows\explorer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.db |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn |
Source: C:\Users\user\AppData\Local\Temp\CDAA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa |