Source: | Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdbSHA256 source: Service.exe, 00000022.00000002.4615232663.00000208B2632000.00000002.00000001.01000000.0000001A.sdmp |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdb source: Service.exe, 00000022.00000002.4618271478.00000208B35D2000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr |
Source: | Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdbSHA256 source: Service.exe, 00000022.00000002.4617920165.00000208B2EE2000.00000002.00000001.01000000.00000027.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdbSHA256 source: System.Text.Encodings.Web.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdb source: Service.exe, 00000022.00000002.4618386784.00000208B3612000.00000002.00000001.01000000.0000002B.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdb source: GrpcClients.dll.0.dr |
Source: | Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb62P2 B2_CorDllMainmscoree.dll source: Service.exe, 00000022.00000002.4618333774.00000208B35F2000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\IDmelonVirtualHidAPI\obj\Release\IDmelonVirtualHidAPI.pdb source: Service.exe, 00000022.00000002.4612253177.0000020899DA2000.00000002.00000001.01000000.00000014.sdmp, IDmelonVirtualHidAPI.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\ServerApi\obj\Release\ServerApi.pdb source: Service.exe, 00000022.00000002.4612407479.0000020899DB2000.00000002.00000001.01000000.00000015.sdmp |
Source: | Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdbSHA256 source: Service.exe, 00000022.00000002.4612627519.0000020899DF2000.00000002.00000001.01000000.00000018.sdmp, DeviceId.dll.0.dr |
Source: | Binary string: T:\altsrc\github\grpc\workspace_csharp_ext_windows_x64\cmake\build\x64\grpc_csharp_ext.pdb source: Service.exe, 00000022.00000002.4632445211.00007FFD8ED5A000.00000002.00000001.01000000.0000000D.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdbg_ source: Service.exe, 00000022.00000002.4617484536.00000208B2E22000.00000002.00000001.01000000.00000023.sdmp, DB.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdbSHA256 source: Service.exe, 00000022.00000002.4617630505.00000208B2E52000.00000002.00000001.01000000.00000025.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdb source: Service.exe, 00000022.00000002.4617484536.00000208B2E22000.00000002.00000001.01000000.00000023.sdmp, DB.dll.0.dr |
Source: | Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Buffers\netfx\System.Buffers.pdb source: System.Buffers.dll.0.dr |
Source: | Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdbSHA256n source: Service.exe, 00000022.00000002.4617703023.00000208B2E62000.00000002.00000001.01000000.00000026.sdmp, Grpc.Core.dll.0.dr |
Source: | Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb source: EllipticCurve.dll.0.dr |
Source: | Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdb source: Service.exe, 00000022.00000002.4617703023.00000208B2E62000.00000002.00000001.01000000.00000026.sdmp, Grpc.Core.dll.0.dr |
Source: | Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.Numerics.Vectors/net46\System.Numerics.Vectors.pdb source: System.Numerics.Vectors.dll.0.dr |
Source: | Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Threading.Tasks.Extensions\netfx\System.Threading.Tasks.Extensions.pdb source: Service.exe, 00000022.00000002.4615292315.00000208B2682000.00000002.00000001.01000000.0000001B.sdmp, System.Threading.Tasks.Extensions.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdbSHA256N source: Service.exe, 00000022.00000002.4618386784.00000208B3612000.00000002.00000001.01000000.0000002B.sdmp |
Source: | Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb~y source: EllipticCurve.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcProtoCompiler\obj\Release\TagReaderGRPC.pdb source: Service.exe, 00000022.00000002.4612565205.0000020899DD2000.00000002.00000001.01000000.00000017.sdmp, TagReaderGRPC.dll.0.dr |
Source: | Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\arm\e_sqlite3.pdb source: e_sqlite3.dll.0.dr |
Source: | Binary string: D:\a\_work\1\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netfx\System.Memory.pdb source: Service.exe, 00000022.00000002.4617310364.00000208B2DE2000.00000002.00000001.01000000.00000021.sdmp |
Source: | Binary string: c:\dev\sqlite\core\sqlite3.pdb source: sqlite3.dll0.0.dr |
Source: | Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp |
Source: | Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdbSHA256w#NtW source: SocketIO.Serializer.Core.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdb source: Service.exe, 00000022.00000002.4617630505.00000208B2E52000.00000002.00000001.01000000.00000025.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr |
Source: | Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdb source: Service.exe, 00000022.00000002.4617402283.00000208B2E12000.00000002.00000001.01000000.00000022.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Logger\obj\Release\Logger.pdb source: Service.exe, 00000022.00000002.4612186527.0000020899D72000.00000002.00000001.01000000.00000013.sdmp, Logger.dll.0.dr |
Source: | Binary string: C:\Program Files (x86)\Jenkins\workspace\pcProxAPI-sdk-release-bot\pcProxAPI\runtime\win\x64\Release\USBWejAPI.pdb source: pcProxAPI.dll0.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdbSHA256CM source: Service.exe, 00000022.00000002.4618271478.00000208B35D2000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr |
Source: | Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdbSHA256 source: Service.exe, 00000022.00000002.4615735176.00000208B27D2000.00000002.00000001.01000000.0000001C.sdmp, RestSharp.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Service\obj\Release\Service.pdb source: Service.exe, 00000022.00000000.2242976539.0000020899552000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr |
Source: | Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdb source: Service.exe, 00000022.00000002.4617920165.00000208B2EE2000.00000002.00000001.01000000.00000027.sdmp |
Source: | Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdb source: Service.exe, 00000022.00000002.4615735176.00000208B27D2000.00000002.00000001.01000000.0000001C.sdmp, RestSharp.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Fido\obj\Release\Fido.pdb source: Service.exe, 00000022.00000002.4615894664.00000208B28A2000.00000002.00000001.01000000.0000001E.sdmp, Fido.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdb source: Service.exe, 00000022.00000002.4617542668.00000208B2E32000.00000002.00000001.01000000.00000024.sdmp, BioKey.dll.0.dr |
Source: | Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb source: websocket-sharp.dll.0.dr |
Source: | Binary string: devcon.pdb source: devcon.exe, 00000029.00000002.2268454913.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000029.00000000.2266613773.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000000.2269070923.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000002.2270785966.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000002.2312651685.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000000.2271554771.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr |
Source: | Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdb source: SocketIO.Serializer.Core.dll.0.dr |
Source: | Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdb source: Service.exe, 00000022.00000002.4615232663.00000208B2632000.00000002.00000001.01000000.0000001A.sdmp |
Source: | Binary string: devcon.pdbGCTL source: devcon.exe, 00000029.00000002.2268454913.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000029.00000000.2266613773.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000000.2269070923.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000002.2270785966.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000002.2312651685.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000000.2271554771.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr |
Source: | Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb* source: websocket-sharp.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Encryption\obj\Release\Encryption.pdb source: Service.exe, 00000022.00000002.4612503866.0000020899DC2000.00000002.00000001.01000000.00000016.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdbAF[F MF_CorDllMainmscoree.dll source: GrpcClients.dll.0.dr |
Source: | Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\x64\e_sqlite3.pdb source: Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, e_sqlite3.dll0.0.dr |
Source: | Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdb source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr |
Source: | Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdb source: Service.exe, 00000022.00000002.4612627519.0000020899DF2000.00000002.00000001.01000000.00000018.sdmp, DeviceId.dll.0.dr |
Source: | Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdb source: System.Text.Encodings.Web.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\WindowsDriverDevelopment\virtual_hid_fido\driver\umdf2\AccessKey\x64\Release\AccessKeyFidoVhid.pdb source: drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, WUDFHost.exe, 00000034.00000002.4611012970.00007FFDA5496000.00000002.00000001.01000000.0000000C.sdmp, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr |
Source: | Binary string: C:\Users\Amini\Downloads\WpfToggleSwitchs\WpfToggleSwitch\CSharp\CSharpControls.Wpf\obj\Release\CSharpControls.Wpf.pdb source: CSharpControls.Wpf.dll.0.dr |
Source: | Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb source: Service.exe, 00000022.00000002.4618333774.00000208B35F2000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr |
Source: | Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdbSHA256 source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdbqI source: Service.exe, 00000022.00000002.4617402283.00000208B2E12000.00000002.00000001.01000000.00000022.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdbo source: Service.exe, 00000022.00000002.4617542668.00000208B2E32000.00000002.00000001.01000000.00000024.sdmp, BioKey.dll.0.dr |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: devcon.exe, 0000002D.00000003.2310425206.0000022D74824000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: devcon.exe, 0000002D.00000003.2310425206.0000022D74824000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr | String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0 |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0 |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0# |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: Service.exe, 00000022.00000002.4612713278.000002089A0B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://idmelon.com |
Source: Service.exe, 00000022.00000000.2242976539.0000020899552000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr | String found in binary or memory: http://idmelon.com9Failed |
Source: Service.exe, 00000022.00000002.4612407479.0000020899DB2000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://idmelon.comoThe |
Source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp | String found in binary or memory: http://james.newtonking.com/projects/json |
Source: Service.exe, 00000022.00000002.4615120681.00000208B25E2000.00000002.00000001.01000000.00000019.sdmp, log4net.dll.0.dr | String found in binary or memory: http://logging.apache.org/log4net/release/faq.html#trouble-EventLog |
Source: Service.exe, 00000022.00000002.4616598483.00000208B2C1D000.00000004.00000020.00020000.00000000.sdmp, Service.exe, 00000022.00000002.4617703023.00000208B2E62000.00000002.00000001.01000000.00000026.sdmp, Service.exe, 00000022.00000002.4614663103.00000208A9E33000.00000004.00000800.00020000.00000000.sdmp, Grpc.Core.dll.0.dr | String found in binary or memory: http://mozilla.org/MPL/2.0/. |
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: nssm.exe, nssm.exe, 00000004.00000000.2206047108.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000006.00000000.2208574349.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000008.00000002.2212494047.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000A.00000000.2213502015.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000C.00000002.2217449909.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000E.00000000.2218317950.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000010.00000000.2220822953.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000012.00000000.2223206621.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000014.00000000.2227930232.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000016.00000000.2230547196.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000018.00000002.2234464657.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001A.00000000.2235696174.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001C.00000000.2238174858.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001E.00000002.2259235944.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000020.00000000.2242032623.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000025.00000002.2262316238.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000027.00000000.2263428963.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000037.00000002.2326468848.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000039.00000002.2328969197.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000003B.00000000.2329500663.0000000140065000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: http://nssm.cc/ |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: devcon.exe, 0000002D.00000003.2310425206.0000022D74824000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: devcon.exe, 0000002D.00000003.2310425206.0000022D74824000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr | String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: http://ocsp.sectigo.com0A |
Source: Service.exe, 00000022.00000002.4612713278.0000020899EB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: Service.exe, 00000022.00000002.4612713278.0000020899E53000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Service.exe, 00000022.00000002.4612713278.0000020899F0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: devcon.exe, 0000002D.00000003.2310425206.0000022D74824000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: devcon.exe, 0000002D.00000003.2310425206.0000022D74824000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, 00000000.00000002.2446274237.0000000000550000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, 00000000.00000003.2445593546.000000000054D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.idmelon.com |
Source: sqlite3.dll0.0.dr | String found in binary or memory: http://www.sqlite.org/copyright.html. |
Source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr | String found in binary or memory: https://aka.ms/binaryformatter |
Source: System.Text.Json.dll.0.dr | String found in binary or memory: https://aka.ms/dotnet-warnings/ |
Source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr | String found in binary or memory: https://aka.ms/serializationformat-binary-obsolete |
Source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp | String found in binary or memory: https://github.com/JamesNK/Newtonsoft.Json |
Source: SocketIO.Serializer.Core.dll.0.dr | String found in binary or memory: https://github.com/doghappy/socket.io-client-csharp |
Source: SocketIO.Serializer.Core.dll.0.dr | String found in binary or memory: https://github.com/doghappy/socket.io-client-csharp& |
Source: Service.exe, 00000022.00000002.4618333774.00000208B35F2000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr, System.Numerics.Vectors.dll.0.dr | String found in binary or memory: https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf |
Source: Service.exe, 00000022.00000002.4618333774.00000208B35F2000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr, System.Numerics.Vectors.dll.0.dr | String found in binary or memory: https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf8 |
Source: Service.exe, 00000022.00000002.4617310364.00000208B2DE2000.00000002.00000001.01000000.00000021.sdmp | String found in binary or memory: https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e3958 |
Source: Service.exe, 00000022.00000002.4617310364.00000208B2DE2000.00000002.00000001.01000000.00000021.sdmp | String found in binary or memory: https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39588 |
Source: Service.exe, 00000022.00000002.4615292315.00000208B2682000.00000002.00000001.01000000.0000001B.sdmp, System.Buffers.dll.0.dr, System.Threading.Tasks.Extensions.dll.0.dr | String found in binary or memory: https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f |
Source: Service.exe, 00000022.00000002.4615292315.00000208B2682000.00000002.00000001.01000000.0000001B.sdmp, Service.exe, 00000022.00000002.4615845352.00000208B2822000.00000002.00000001.01000000.0000001D.sdmp, System.Buffers.dll.0.dr, System.Threading.Tasks.Extensions.dll.0.dr, System.Runtime.CompilerServices.Unsafe.dll.0.dr | String found in binary or memory: https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f8 |
Source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr | String found in binary or memory: https://github.com/dotnet/roslyn/issues/46646 |
Source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr | String found in binary or memory: https://github.com/dotnet/roslyn/issues/46646~ |
Source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Encodings.Web.dll.0.dr, System.Text.Json.dll.0.dr | String found in binary or memory: https://github.com/dotnet/runtime |
Source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr | String found in binary or memory: https://github.com/dotnet/runtime/issues/73124. |
Source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr | String found in binary or memory: https://github.com/dotnet/runtime8 |
Source: Service.exe, 00000022.00000002.4617630505.00000208B2E52000.00000002.00000001.01000000.00000025.sdmp, Service.exe, 00000022.00000002.4618386784.00000208B3612000.00000002.00000001.01000000.0000002B.sdmp, Service.exe, 00000022.00000002.4618271478.00000208B35D2000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr, SQLitePCLRaw.batteries_v2.dll.0.dr | String found in binary or memory: https://github.com/ericsink/SQLitePCL.raw |
Source: Service.exe, 00000022.00000002.4618386784.00000208B3612000.00000002.00000001.01000000.0000002B.sdmp | String found in binary or memory: https://github.com/ericsink/SQLitePCL.rawH |
Source: Service.exe, 00000022.00000002.4618271478.00000208B35D2000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr | String found in binary or memory: https://github.com/ericsink/SQLitePCL.rawX |
Source: Service.exe, 00000022.00000002.4615232663.00000208B2632000.00000002.00000001.01000000.0000001A.sdmp | String found in binary or memory: https://github.com/grpc/grpc-dotnet.git |
Source: Service.exe, 00000022.00000002.4617703023.00000208B2E62000.00000002.00000001.01000000.00000026.sdmp, Grpc.Core.dll.0.dr | String found in binary or memory: https://github.com/grpc/grpc.git |
Source: Service.exe, 00000022.00000002.4617703023.00000208B2E62000.00000002.00000001.01000000.00000026.sdmp, Grpc.Core.dll.0.dr | String found in binary or memory: https://github.com/grpc/grpc.git6 |
Source: Service.exe, 00000022.00000002.4632445211.00007FFD8EBDD000.00000002.00000001.01000000.0000000D.sdmp | String found in binary or memory: https://github.com/netty/netty/issues/6520. |
Source: Service.exe, 00000022.00000002.4632445211.00007FFD8EBDD000.00000002.00000001.01000000.0000000D.sdmp | String found in binary or memory: https://github.com/netty/netty/issues/6520.s |
Source: Service.exe, 00000022.00000002.4618163920.00000208B3592000.00000002.00000001.01000000.00000028.sdmp | String found in binary or memory: https://github.com/praeclarum/sqlite-net.git |
Source: Service.exe, 00000022.00000002.4618163920.00000208B3592000.00000002.00000001.01000000.00000028.sdmp | String found in binary or memory: https://github.com/praeclarum/sqlite-net.git7 |
Source: Service.exe, 00000022.00000002.4617920165.00000208B2EE2000.00000002.00000001.01000000.00000027.sdmp | String found in binary or memory: https://github.com/protocolbuffers/protobuf.git |
Source: Service.exe, 00000022.00000002.4615735176.00000208B27D2000.00000002.00000001.01000000.0000001C.sdmp, RestSharp.dll.0.dr | String found in binary or memory: https://github.com/restsharp/RestSharp.git |
Source: Service.exe, 00000022.00000002.4612407479.0000020899DB2000.00000002.00000001.01000000.00000015.sdmp, Service.exe, 00000022.00000002.4612713278.0000020899E11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://idmp.idmelon.com/v2 |
Source: Service.exe, 00000022.00000000.2242976539.0000020899552000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr | String found in binary or memory: https://idmp.idmelon.com/v2/Received |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: https://sectigo.com/CPS0 |
Source: pcProxAPI.dll0.0.dr | String found in binary or memory: https://sectigo.com/CPS0D |
Source: Service.exe, 00000022.00000002.4612713278.0000020899E53000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://skm.idmelon.com |
Source: Service.exe, 00000022.00000002.4612713278.000002089A243000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://skm.idmelon.com/apis/access-key |
Source: Service.exe, 00000022.00000002.4612407479.0000020899DB2000.00000002.00000001.01000000.00000015.sdmp, Service.exe, 00000022.00000000.2242976539.0000020899552000.00000002.00000001.01000000.00000008.sdmp, Service.exe, 00000022.00000002.4612713278.0000020899E11000.00000004.00000800.00020000.00000000.sdmp, Service.exe.0.dr | String found in binary or memory: https://skm.idmelon.com/apis/access-key-cli/v1 |
Source: Service.exe, 00000022.00000002.4612713278.0000020899E53000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://skm.idmelon.com/apis/access-key-cli/v1/apps |
Source: Service.exe, 00000022.00000002.4612713278.000002089A243000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://skm.idmelon.com/apis/access-key-cli/v18 |
Source: Grpc.Core.dll.0.dr | String found in binary or memory: https://www.catcert.net/verarrel |
Source: devcon.exe, 0000002D.00000003.2310425206.0000022D74824000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: Service.exe, 00000022.00000002.4632445211.00007FFD8EBDD000.00000002.00000001.01000000.0000000D.sdmp | String found in binary or memory: https://www.googleapis.com/auth/cloud-platform |
Source: Service.exe, 00000022.00000002.4632445211.00007FFD8EBDD000.00000002.00000001.01000000.0000000D.sdmp | String found in binary or memory: https://www.googleapis.com/auth/cloud-platformExternalAccountCredentials |
Source: Service.exe, 00000022.00000002.4612407479.0000020899DB2000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: https://www.idmelon.com/downloads/pairing_tool/setup.exe?v= |
Source: Service.exe, 00000022.00000002.4612407479.0000020899DB2000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: https://www.idmelon.com/downloads/pairing_tool/version.json |
Source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp | String found in binary or memory: https://www.newtonsoft.com/jsonschema |
Source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp | String found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Code function: 0_2_00406DE6 | 0_2_00406DE6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Code function: 0_2_004075BD | 0_2_004075BD |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_000000014000D2D0 | 4_2_000000014000D2D0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140023864 | 4_2_0000000140023864 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140010470 | 4_2_0000000140010470 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_00000001400070A0 | 4_2_00000001400070A0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140019CB4 | 4_2_0000000140019CB4 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_00000001400030D0 | 4_2_00000001400030D0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_000000014000F500 | 4_2_000000014000F500 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140013D10 | 4_2_0000000140013D10 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140005D20 | 4_2_0000000140005D20 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_000000014000DD40 | 4_2_000000014000DD40 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140012550 | 4_2_0000000140012550 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140022D60 | 4_2_0000000140022D60 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_000000014001CDD4 | 4_2_000000014001CDD4 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140012E00 | 4_2_0000000140012E00 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140008E20 | 4_2_0000000140008E20 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140020A2C | 4_2_0000000140020A2C |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_000000014000EE50 | 4_2_000000014000EE50 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140021B40 | 4_2_0000000140021B40 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_0000000140002B50 | 4_2_0000000140002B50 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_000000014001ABAC | 4_2_000000014001ABAC |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Code function: 4_2_000000014001DBB8 | 4_2_000000014001DBB8 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E25DC60 | 34_2_00007FFD8E25DC60 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2C7D20 | 34_2_00007FFD8E2C7D20 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E291BF0 | 34_2_00007FFD8E291BF0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E28A3C0 | 34_2_00007FFD8E28A3C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D83B0 | 34_2_00007FFD8E1D83B0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2420F0 | 34_2_00007FFD8E2420F0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1CC0E0 | 34_2_00007FFD8E1CC0E0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1F0ED0 | 34_2_00007FFD8E1F0ED0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D7EB0 | 34_2_00007FFD8E1D7EB0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E284F00 | 34_2_00007FFD8E284F00 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E26DEF0 | 34_2_00007FFD8E26DEF0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E255EF0 | 34_2_00007FFD8E255EF0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E238F90 | 34_2_00007FFD8E238F90 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E206F70 | 34_2_00007FFD8E206F70 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2D0F60 | 34_2_00007FFD8E2D0F60 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1C2FB0 | 34_2_00007FFD8E1C2FB0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2CDFF0 | 34_2_00007FFD8E2CDFF0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E27B050 | 34_2_00007FFD8E27B050 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2B5050 | 34_2_00007FFD8E2B5050 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E214CC0 | 34_2_00007FFD8E214CC0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E20BD00 | 34_2_00007FFD8E20BD00 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E21ACE0 | 34_2_00007FFD8E21ACE0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E279DD0 | 34_2_00007FFD8E279DD0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E262DB0 | 34_2_00007FFD8E262DB0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E27DDE0 | 34_2_00007FFD8E27DDE0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2D3DE0 | 34_2_00007FFD8E2D3DE0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2DAE50 | 34_2_00007FFD8E2DAE50 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E234E30 | 34_2_00007FFD8E234E30 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E264A90 | 34_2_00007FFD8E264A90 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E243A80 | 34_2_00007FFD8E243A80 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E251A60 | 34_2_00007FFD8E251A60 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E254AA0 | 34_2_00007FFD8E254AA0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D2B01 | 34_2_00007FFD8E1D2B01 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E22EB00 | 34_2_00007FFD8E22EB00 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E23FB50 | 34_2_00007FFD8E23FB50 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E201B80 | 34_2_00007FFD8E201B80 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1C8B80 | 34_2_00007FFD8E1C8B80 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1FABA0 | 34_2_00007FFD8E1FABA0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1E4BA0 | 34_2_00007FFD8E1E4BA0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E208C00 | 34_2_00007FFD8E208C00 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1FEC10 | 34_2_00007FFD8E1FEC10 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2CEC00 | 34_2_00007FFD8E2CEC00 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1FFC40 | 34_2_00007FFD8E1FFC40 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1DBC20 | 34_2_00007FFD8E1DBC20 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1F6880 | 34_2_00007FFD8E1F6880 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E22F860 | 34_2_00007FFD8E22F860 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2118C0 | 34_2_00007FFD8E2118C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2D58B0 | 34_2_00007FFD8E2D58B0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2C1910 | 34_2_00007FFD8E2C1910 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2268F0 | 34_2_00007FFD8E2268F0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E28A920 | 34_2_00007FFD8E28A920 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D4980 | 34_2_00007FFD8E1D4980 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E23B980 | 34_2_00007FFD8E23B980 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D09C0 | 34_2_00007FFD8E1D09C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2D09B0 | 34_2_00007FFD8E2D09B0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2879E0 | 34_2_00007FFD8E2879E0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E227A20 | 34_2_00007FFD8E227A20 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E256A20 | 34_2_00007FFD8E256A20 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2B4680 | 34_2_00007FFD8E2B4680 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E21B6D0 | 34_2_00007FFD8E21B6D0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1C06C0 | 34_2_00007FFD8E1C06C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E22A6C0 | 34_2_00007FFD8E22A6C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D271E | 34_2_00007FFD8E1D271E |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E260780 | 34_2_00007FFD8E260780 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1FC770 | 34_2_00007FFD8E1FC770 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E21F7C0 | 34_2_00007FFD8E21F7C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E203840 | 34_2_00007FFD8E203840 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1F2480 | 34_2_00007FFD8E1F2480 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E21D480 | 34_2_00007FFD8E21D480 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E219460 | 34_2_00007FFD8E219460 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E26F460 | 34_2_00007FFD8E26F460 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2724D0 | 34_2_00007FFD8E2724D0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1E9500 | 34_2_00007FFD8E1E9500 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1F050F | 34_2_00007FFD8E1F050F |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2054F0 | 34_2_00007FFD8E2054F0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E218530 | 34_2_00007FFD8E218530 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E236520 | 34_2_00007FFD8E236520 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1E0570 | 34_2_00007FFD8E1E0570 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D65C0 | 34_2_00007FFD8E1D65C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1E35D0 | 34_2_00007FFD8E1E35D0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1EA5E0 | 34_2_00007FFD8E1EA5E0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E261260 | 34_2_00007FFD8E261260 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2502F0 | 34_2_00007FFD8E2502F0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2B9340 | 34_2_00007FFD8E2B9340 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1B3350 | 34_2_00007FFD8E1B3350 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E227330 | 34_2_00007FFD8E227330 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E234320 | 34_2_00007FFD8E234320 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D5360 | 34_2_00007FFD8E1D5360 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2293C0 | 34_2_00007FFD8E2293C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E20F3C0 | 34_2_00007FFD8E20F3C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E26D3A0 | 34_2_00007FFD8E26D3A0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1F73B0 | 34_2_00007FFD8E1F73B0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1C63F0 | 34_2_00007FFD8E1C63F0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1F6450 | 34_2_00007FFD8E1F6450 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1ED080 | 34_2_00007FFD8E1ED080 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2C7080 | 34_2_00007FFD8E2C7080 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E1D70C0 | 34_2_00007FFD8E1D70C0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E23F0A0 | 34_2_00007FFD8E23F0A0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2160A0 | 34_2_00007FFD8E2160A0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E25B0A0 | 34_2_00007FFD8E25B0A0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2920F0 | 34_2_00007FFD8E2920F0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E20C0E0 | 34_2_00007FFD8E20C0E0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E2CD1A0 | 34_2_00007FFD8E2CD1A0 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E21A210 | 34_2_00007FFD8E21A210 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E20A250 | 34_2_00007FFD8E20A250 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Code function: 34_2_00007FFD8E277240 | 34_2_00007FFD8E277240 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Code function: 41_2_00007FF7DF231A20 | 41_2_00007FF7DF231A20 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Code function: 41_2_00007FF7DF234180 | 41_2_00007FF7DF234180 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Code function: 41_2_00007FF7DF235C80 | 41_2_00007FF7DF235C80 |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Code function: 41_2_00007FF7DF232A04 | 41_2_00007FF7DF232A04 |
Source: C:\Windows\System32\WUDFHost.exe | Code function: 52_2_00007FFDA549103C | 52_2_00007FFDA549103C |
Source: C:\Windows\System32\WUDFHost.exe | Code function: 52_2_00007FFDA54927CC | 52_2_00007FFDA54927CC |
Source: sqlite3.dll0.0.dr | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: sqlite3.dll0.0.dr | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr | Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: sqlite3.dll0.0.dr | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0 |
Source: sqlite3.dll0.0.dr | Binary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d)) |
Source: Service.exe, Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr | Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB); |
Source: Service.exe, Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr | Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB); |
Source: Service.exe, Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr | Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx)); |
Source: sqlite3.dll0.0.dr | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: sqlite3.dll0.0.dr | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: Service.exe, Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr | Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q); |
Source: Service.exe, Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr | Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB); |
Source: sqlite3.dll0.0.dr | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: Service.exe, Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr | Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode); |
Source: sqlite3.dll0.0.dr | Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: sqlite3.dll0.0.dr | Binary or memory string: CREATE TABLE xx( name STRING, /* Name of table or index */ path INTEGER, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype STRING, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */); |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\SysWOW64\setx.exe setx /M IDmelonMode access-key | |
Source: C:\Windows\SysWOW64\setx.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exe | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdoutCreationDisposition 4 | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4 | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1 | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0 | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400 | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000 | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" restart AccesskeyService | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process created: C:\Windows\System32\dsregcmd.exe "C:\Windows\System32\dsregcmd.exe" /status | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" status AccesskeyService | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" start AccesskeyService | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHid | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccessKeyFidoVhid | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" install "C:\Program Files (x86)\IDmelon\Accesskey\driver\accesskeyfidovhid.inf" root\AccessKeyFidoVhid | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{0721629b-1bca-ab45-b3d8-6d54ebfa50a2}\accesskeyfidovhid.inf" "9" "4196477d7" "000000000000015C" "WinSta0\Default" "0000000000000164" "208" "c:\program files (x86)\idmelon\accesskey\driver" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Windows\System32\drvinst.exe DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:50ab71fe221ae399:AccessKeyFidoVhid:21.4.53.488:root\accesskeyfidovhid," "4196477d7" "000000000000017C" | |
Source: unknown | Process created: C:\Windows\System32\WUDFHost.exe "C:\Windows\System32\WUDFHost.exe" -HostGUID:{193a1820-d9ac-4997-8c55-be817523f6aa} -IoEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-97f4f2de-0b6d-4708-9672-29cbfafe41c2 -SystemEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-ed4957c4-0381-42c5-b015-dd634ba9f208 -IoCancelEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-6f2c6ea5-0b65-4a5a-8a6d-a02cb8e867d5 -NonStateChangingEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-d0cce0e5-6853-4eca-8ea9-ec55e74c196f -LifetimeId:46a3174a-9ab4-4718-a9ea-f0f3d3c57b11 -DeviceGroupId:WudfDefaultDevicePool -HostArg:0 | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Windows\System32\drvinst.exe DrvInst.exe "1" "0" "HID\HIDCLASS\1&2d595ca7&0&0000" "" "" "4eeb73e57" "0000000000000000" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyReaderService "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log" | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\SysWOW64\setx.exe setx /M IDmelonMode access-key | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdoutCreationDisposition 4 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" status AccesskeyService | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" start AccesskeyService | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHid | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" install "C:\Program Files (x86)\IDmelon\Accesskey\driver\accesskeyfidovhid.inf" root\AccessKeyFidoVhid | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" status AccesskeyService | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process created: C:\Windows\System32\dsregcmd.exe "C:\Windows\System32\dsregcmd.exe" /status | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{0721629b-1bca-ab45-b3d8-6d54ebfa50a2}\accesskeyfidovhid.inf" "9" "4196477d7" "000000000000015C" "WinSta0\Default" "0000000000000164" "208" "c:\program files (x86)\idmelon\accesskey\driver" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Windows\System32\drvinst.exe DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:50ab71fe221ae399:AccessKeyFidoVhid:21.4.53.488:root\accesskeyfidovhid," "4196477d7" "000000000000017C" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Windows\System32\drvinst.exe DrvInst.exe "1" "0" "HID\HIDCLASS\1&2d595ca7&0&0000" "" "" "4eeb73e57" "0000000000000000" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\setx.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: mscoree.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: apphelp.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: cryptsp.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: rsaenh.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: cryptbase.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: windows.storage.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: wldp.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: profapi.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ncrypt.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ntasn1.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ncrypt.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ntasn1.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ncryptprov.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: iphlpapi.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: dnsapi.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: winnsi.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: wbemcomn.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: amsi.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: userenv.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: sspicli.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: rasapi32.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: rasman.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: rtutils.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: mswsock.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: winhttp.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: rasadhlp.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: secur32.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: schannel.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: msasn1.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: gpapi.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Section loaded: dbghelp.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: msvcp110_win.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: dsreg.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: wkscli.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: cryptngc.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: devobj.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: winsta.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: policymanager.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Windows\System32\dsregcmd.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: devobj.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: msasn1.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: devobj.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: msasn1.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: devrtl.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: spinf.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: drvstore.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: devobj.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: newdev.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: msasn1.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: cryptsp.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: rsaenh.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: cryptbase.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: gpapi.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: cabinet.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpnpmgr.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: devrtl.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: devrtl.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: drvstore.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: cabinet.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: devrtl.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: drvstore.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: devobj.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: cabinet.dll | |
Source: C:\Windows\System32\WUDFHost.exe | Section loaded: devobj.dll | |
Source: C:\Windows\System32\WUDFHost.exe | Section loaded: wudfplatform.dll | |
Source: C:\Windows\System32\WUDFHost.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WUDFHost.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WUDFHost.exe | Section loaded: dbghelp.dll | |
Source: C:\Windows\System32\WUDFHost.exe | Section loaded: wudfx02000.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: devrtl.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: drvstore.dll | |
Source: C:\Windows\System32\drvinst.exe | Section loaded: devobj.dll | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Section loaded: cryptbase.dll | |
Source: | Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdbSHA256 source: Service.exe, 00000022.00000002.4615232663.00000208B2632000.00000002.00000001.01000000.0000001A.sdmp |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdb source: Service.exe, 00000022.00000002.4618271478.00000208B35D2000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr |
Source: | Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdbSHA256 source: Service.exe, 00000022.00000002.4617920165.00000208B2EE2000.00000002.00000001.01000000.00000027.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdbSHA256 source: System.Text.Encodings.Web.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdb source: Service.exe, 00000022.00000002.4618386784.00000208B3612000.00000002.00000001.01000000.0000002B.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdb source: GrpcClients.dll.0.dr |
Source: | Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb62P2 B2_CorDllMainmscoree.dll source: Service.exe, 00000022.00000002.4618333774.00000208B35F2000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\IDmelonVirtualHidAPI\obj\Release\IDmelonVirtualHidAPI.pdb source: Service.exe, 00000022.00000002.4612253177.0000020899DA2000.00000002.00000001.01000000.00000014.sdmp, IDmelonVirtualHidAPI.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\ServerApi\obj\Release\ServerApi.pdb source: Service.exe, 00000022.00000002.4612407479.0000020899DB2000.00000002.00000001.01000000.00000015.sdmp |
Source: | Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdbSHA256 source: Service.exe, 00000022.00000002.4612627519.0000020899DF2000.00000002.00000001.01000000.00000018.sdmp, DeviceId.dll.0.dr |
Source: | Binary string: T:\altsrc\github\grpc\workspace_csharp_ext_windows_x64\cmake\build\x64\grpc_csharp_ext.pdb source: Service.exe, 00000022.00000002.4632445211.00007FFD8ED5A000.00000002.00000001.01000000.0000000D.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdbg_ source: Service.exe, 00000022.00000002.4617484536.00000208B2E22000.00000002.00000001.01000000.00000023.sdmp, DB.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdbSHA256 source: Service.exe, 00000022.00000002.4617630505.00000208B2E52000.00000002.00000001.01000000.00000025.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdb source: Service.exe, 00000022.00000002.4617484536.00000208B2E22000.00000002.00000001.01000000.00000023.sdmp, DB.dll.0.dr |
Source: | Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Buffers\netfx\System.Buffers.pdb source: System.Buffers.dll.0.dr |
Source: | Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdbSHA256n source: Service.exe, 00000022.00000002.4617703023.00000208B2E62000.00000002.00000001.01000000.00000026.sdmp, Grpc.Core.dll.0.dr |
Source: | Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb source: EllipticCurve.dll.0.dr |
Source: | Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdb source: Service.exe, 00000022.00000002.4617703023.00000208B2E62000.00000002.00000001.01000000.00000026.sdmp, Grpc.Core.dll.0.dr |
Source: | Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.Numerics.Vectors/net46\System.Numerics.Vectors.pdb source: System.Numerics.Vectors.dll.0.dr |
Source: | Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Threading.Tasks.Extensions\netfx\System.Threading.Tasks.Extensions.pdb source: Service.exe, 00000022.00000002.4615292315.00000208B2682000.00000002.00000001.01000000.0000001B.sdmp, System.Threading.Tasks.Extensions.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdbSHA256N source: Service.exe, 00000022.00000002.4618386784.00000208B3612000.00000002.00000001.01000000.0000002B.sdmp |
Source: | Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb~y source: EllipticCurve.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcProtoCompiler\obj\Release\TagReaderGRPC.pdb source: Service.exe, 00000022.00000002.4612565205.0000020899DD2000.00000002.00000001.01000000.00000017.sdmp, TagReaderGRPC.dll.0.dr |
Source: | Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\arm\e_sqlite3.pdb source: e_sqlite3.dll.0.dr |
Source: | Binary string: D:\a\_work\1\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netfx\System.Memory.pdb source: Service.exe, 00000022.00000002.4617310364.00000208B2DE2000.00000002.00000001.01000000.00000021.sdmp |
Source: | Binary string: c:\dev\sqlite\core\sqlite3.pdb source: sqlite3.dll0.0.dr |
Source: | Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp |
Source: | Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdbSHA256w#NtW source: SocketIO.Serializer.Core.dll.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdb source: Service.exe, 00000022.00000002.4617630505.00000208B2E52000.00000002.00000001.01000000.00000025.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr |
Source: | Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: Service.exe, 00000022.00000002.4615989693.00000208B28D2000.00000002.00000001.01000000.0000001F.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdb source: Service.exe, 00000022.00000002.4617402283.00000208B2E12000.00000002.00000001.01000000.00000022.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Logger\obj\Release\Logger.pdb source: Service.exe, 00000022.00000002.4612186527.0000020899D72000.00000002.00000001.01000000.00000013.sdmp, Logger.dll.0.dr |
Source: | Binary string: C:\Program Files (x86)\Jenkins\workspace\pcProxAPI-sdk-release-bot\pcProxAPI\runtime\win\x64\Release\USBWejAPI.pdb source: pcProxAPI.dll0.0.dr |
Source: | Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdbSHA256CM source: Service.exe, 00000022.00000002.4618271478.00000208B35D2000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr |
Source: | Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdbSHA256 source: Service.exe, 00000022.00000002.4615735176.00000208B27D2000.00000002.00000001.01000000.0000001C.sdmp, RestSharp.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Service\obj\Release\Service.pdb source: Service.exe, 00000022.00000000.2242976539.0000020899552000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr |
Source: | Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdb source: Service.exe, 00000022.00000002.4617920165.00000208B2EE2000.00000002.00000001.01000000.00000027.sdmp |
Source: | Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdb source: Service.exe, 00000022.00000002.4615735176.00000208B27D2000.00000002.00000001.01000000.0000001C.sdmp, RestSharp.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Fido\obj\Release\Fido.pdb source: Service.exe, 00000022.00000002.4615894664.00000208B28A2000.00000002.00000001.01000000.0000001E.sdmp, Fido.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdb source: Service.exe, 00000022.00000002.4617542668.00000208B2E32000.00000002.00000001.01000000.00000024.sdmp, BioKey.dll.0.dr |
Source: | Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb source: websocket-sharp.dll.0.dr |
Source: | Binary string: devcon.pdb source: devcon.exe, 00000029.00000002.2268454913.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000029.00000000.2266613773.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000000.2269070923.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000002.2270785966.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000002.2312651685.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000000.2271554771.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr |
Source: | Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdb source: SocketIO.Serializer.Core.dll.0.dr |
Source: | Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdb source: Service.exe, 00000022.00000002.4615232663.00000208B2632000.00000002.00000001.01000000.0000001A.sdmp |
Source: | Binary string: devcon.pdbGCTL source: devcon.exe, 00000029.00000002.2268454913.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000029.00000000.2266613773.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000000.2269070923.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002B.00000002.2270785966.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000002.2312651685.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002D.00000000.2271554771.00007FF7DF238000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr |
Source: | Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb* source: websocket-sharp.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Encryption\obj\Release\Encryption.pdb source: Service.exe, 00000022.00000002.4612503866.0000020899DC2000.00000002.00000001.01000000.00000016.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdbAF[F MF_CorDllMainmscoree.dll source: GrpcClients.dll.0.dr |
Source: | Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\x64\e_sqlite3.pdb source: Service.exe, 00000022.00000002.4624644715.00007FFD8E2EE000.00000002.00000001.01000000.0000000E.sdmp, e_sqlite3.dll0.0.dr |
Source: | Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdb source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr |
Source: | Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdb source: Service.exe, 00000022.00000002.4612627519.0000020899DF2000.00000002.00000001.01000000.00000018.sdmp, DeviceId.dll.0.dr |
Source: | Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdb source: System.Text.Encodings.Web.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\WindowsDriverDevelopment\virtual_hid_fido\driver\umdf2\AccessKey\x64\Release\AccessKeyFidoVhid.pdb source: drvinst.exe, 00000030.00000003.2291043123.00000277C3619000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000030.00000003.2288648920.00000277C357B000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000031.00000003.2307974008.00000242EF2B8000.00000004.00000020.00020000.00000000.sdmp, WUDFHost.exe, 00000034.00000002.4611012970.00007FFDA5496000.00000002.00000001.01000000.0000000C.sdmp, SET42C8.tmp.45.dr, AccessKeyFidoVhid.dll.0.dr, SET44BC.tmp.48.dr |
Source: | Binary string: C:\Users\Amini\Downloads\WpfToggleSwitchs\WpfToggleSwitch\CSharp\CSharpControls.Wpf\obj\Release\CSharpControls.Wpf.pdb source: CSharpControls.Wpf.dll.0.dr |
Source: | Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb source: Service.exe, 00000022.00000002.4618333774.00000208B35F2000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr |
Source: | Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdbSHA256 source: Service.exe, 00000022.00000002.4616236977.00000208B2992000.00000002.00000001.01000000.00000020.sdmp, System.Text.Json.dll.0.dr |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdbqI source: Service.exe, 00000022.00000002.4617402283.00000208B2E12000.00000002.00000001.01000000.00000022.sdmp |
Source: | Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdbo source: Service.exe, 00000022.00000002.4617542668.00000208B2E32000.00000002.00000001.01000000.00000024.sdmp, BioKey.dll.0.dr |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Fido.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Users\user\AppData\Local\Temp\nstB00.tmp\EnVar.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Users\user\AppData\Local\Temp\nstB00.tmp\nsExec.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | File created: C:\Windows\System32\DriverStore\Temp\{2b66b655-e0ff-c54b-ab20-dac488c814f3}\AccessKeyFidoVhid.dll (copy) | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\CBOR.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\EllipticCurve.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\ServerApi.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x86.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Users\user\AppData\Local\Temp\nstB00.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\DB.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Logger.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\URIUtility.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.Buffers.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | File created: C:\Windows\System32\drivers\UMDF\AccessKeyFidoVhid.dll (copy) | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Encryption.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.ValueTuple.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\x64\sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.Threading.Tasks.Extensions.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Encodings.Web.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\RestSharp.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.Runtime.CompilerServices.Unsafe.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\x86\sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x86\native\e_sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SQLite-net.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\64\pcProxAPI.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.batteries_v2.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\AccessKeyFidoVhid.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Suprema.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Json.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\WebKeyLocalServiceDotNetx64.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\GrpcClients.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.SystemTextJson.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\uninstall.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.Core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\websocket-sharp.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\32\pcProxAPI.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\IDmelonVirtualHidAPI.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | File created: C:\Windows\System32\drivers\UMDF\SET4B63.tmp | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x64.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Newtonsoft.Json.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.Numerics.Vectors.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Jump to dropped file |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | File created: C:\Users\user\AppData\Local\Temp\{0721629b-1bca-ab45-b3d8-6d54ebfa50a2}\SET42C8.tmp | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\AccesskeyCli.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFScanner.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\FontAwesome.WPF.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-arm\native\e_sqlite3.dll | Jump to dropped file |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | File created: C:\Users\user\AppData\Local\Temp\{0721629b-1bca-ab45-b3d8-6d54ebfa50a2}\AccessKeyFidoVhid.dll (copy) | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Users\user\AppData\Local\Temp\nstB00.tmp\InstallOptions.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\TagReaderGRPC.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFMatcher.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.Api.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Google.Protobuf.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\CommandLine.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIOClient.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Microsoft.Bcl.AsyncInterfaces.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\System.Memory.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\WpfAnimatedGif.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\log4net.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\CSharpControls.Wpf.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\Numbers.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x64\native\e_sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\DeviceId.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\BioKey.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | File created: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.provider.dynamic_cdecl.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | File created: C:\Windows\System32\DriverStore\Temp\{2b66b655-e0ff-c54b-ab20-dac488c814f3}\SET44BC.tmp | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\setx.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\setx.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WUDFHost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WUDFHost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\drvinst.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nstB00.tmp\EnVar.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Fido.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nstB00.tmp\nsExec.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | Dropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{2b66b655-e0ff-c54b-ab20-dac488c814f3}\AccessKeyFidoVhid.dll (copy) | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\CBOR.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\EllipticCurve.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\ServerApi.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x86.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nstB00.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\DB.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Logger.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\URIUtility.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | Dropped PE file which has not been started: C:\Windows\System32\drivers\UMDF\AccessKeyFidoVhid.dll (copy) | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Buffers.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.ValueTuple.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\x64\sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Encryption.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Threading.Tasks.Extensions.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Encodings.Web.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\RestSharp.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Runtime.CompilerServices.Unsafe.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\x86\sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x86\native\e_sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLite-net.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\64\pcProxAPI.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.batteries_v2.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Driver\AccessKeyFidoVhid.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Suprema.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Json.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\WebKeyLocalServiceDotNetx64.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\GrpcClients.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.SystemTextJson.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\uninstall.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.Core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\websocket-sharp.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\32\pcProxAPI.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\IDmelonVirtualHidAPI.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | Dropped PE file which has not been started: C:\Windows\System32\drivers\UMDF\SET4B63.tmp | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x64.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Newtonsoft.Json.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Numerics.Vectors.dll | Jump to dropped file |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{0721629b-1bca-ab45-b3d8-6d54ebfa50a2}\SET42C8.tmp | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\AccesskeyCli.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFScanner.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\FontAwesome.WPF.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-arm\native\e_sqlite3.dll | Jump to dropped file |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{0721629b-1bca-ab45-b3d8-6d54ebfa50a2}\AccessKeyFidoVhid.dll (copy) | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\TagReaderGRPC.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nstB00.tmp\InstallOptions.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFMatcher.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.Api.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Google.Protobuf.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\CommandLine.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIOClient.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Microsoft.Bcl.AsyncInterfaces.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Memory.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\WpfAnimatedGif.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\log4net.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\CSharpControls.Wpf.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Numbers.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x64\native\e_sqlite3.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Core.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\DeviceId.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\BioKey.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Dropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.provider.dynamic_cdecl.dll | Jump to dropped file |
Source: C:\Windows\System32\drvinst.exe | Dropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{2b66b655-e0ff-c54b-ab20-dac488c814f3}\SET44BC.tmp | Jump to dropped file |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\WUDFHost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\WUDFHost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: setupapi.dev.log.45.dr | Binary or memory string: set: BIOS Vendor: VMware, Inc. |
Source: setupapi.dev.log.45.dr | Binary or memory string: sig: Key = vmci.inf |
Source: setupapi.dev.log.45.dr | Binary or memory string: dvs: {Driver Setup Import Driver Package: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.178 |
Source: setupapi.dev.log.45.dr | Binary or memory string: idb: Activating driver package 'vmci.inf_amd64_68ed49469341f563'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: cpy: Published 'vmci.inf_amd64_68ed49469341f563\vmci.inf' to 'oem2.inf'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: {Add Service: vmci} |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: Created new service 'vmci'. |
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Binary or memory string: qeMuI |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: Display Name = VMware VMCI Bus Driver |
Source: setupapi.dev.log.45.dr | Binary or memory string: set: PCI\VEN_15AD&DEV_0740&SUBSYS_074015AD&REV_10\3&61AAA01&0&3F -> Configured [oem2.inf:PCI\VEN_15AD&DEV_0740&SUBSYS_074015AD,vmci.install.x64.NT] and started (ConfigFlags = 0x00000000). |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: Service Name = vmci |
Source: setupapi.dev.log.45.dr | Binary or memory string: set: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 -> Configured [disk.inf:GenDisk,disk_install.NT] and started (ConfigFlags = 0x00000000). |
Source: setupapi.dev.log.45.dr | Binary or memory string: idb: {Publish Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf} 11:48:39.707 |
Source: setupapi.dev.log.45.dr | Binary or memory string: idb: Indexed 4 device IDs for 'vmci.inf_amd64_68ed49469341f563'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: utl: Driver INF - oem2.inf (C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf) |
Source: setupapi.dev.log.45.dr | Binary or memory string: set: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 -> Configured [cdrom.inf:GenCdRom,cdrom_install] and started (ConfigFlags = 0x00000000). |
Source: setupapi.dev.log.45.dr | Binary or memory string: set: System Product Name: VMware20,1 |
Source: setupapi.dev.log.45.dr | Binary or memory string: sto: {Configure Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf} |
Source: Grpc.Core.dll.0.dr | Binary or memory string: zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd |
Source: Service.exe, 00000022.00000002.4615405150.00000208B274E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: setupapi.dev.log.45.dr | Binary or memory string: sto: {Stage Driver Package: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.634 |
Source: setupapi.dev.log.45.dr | Binary or memory string: sig: Installed catalog 'vmci.cat' as 'oem2.cat'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: cpy: Target Path = C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563 |
Source: setupapi.dev.log.45.dr | Binary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.inf' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.inf'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: sig: FilePath = C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.inf |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: {Configure Driver Configuration: vmci.install.x64.NT} |
Source: setupapi.dev.log.45.dr | Binary or memory string: idb: Created driver package object 'vmci.inf_amd64_68ed49469341f563' in SYSTEM database node. |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: Image Path = System32\drivers\vmci.sys |
Source: setupapi.dev.log.45.dr | Binary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.cat' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.cat'. |
Source: dsregcmd.exe, 00000024.00000003.2255349021.000001E80AD86000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: NXTVMWare |
Source: setupapi.dev.log.45.dr | Binary or memory string: sig: Catalog = C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.cat |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: Section Name = vmci.install.x64.NT |
Source: setupapi.dev.log.45.dr | Binary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.sys' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.sys'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: idb: Registered driver package 'vmci.inf_amd64_68ed49469341f563' with 'oem2.inf'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: Driver package 'vmci.inf' is configurable. |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: {Configure Driver: VMware VMCI Bus Device} |
Source: setupapi.dev.log.45.dr | Binary or memory string: inf: {Query Configurability: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.636 |
Source: setupapi.dev.log.45.dr | Binary or memory string: sto: {Core Driver Package Import: vmci.inf_amd64_68ed49469341f563} 11:48:39.704 |
Source: setupapi.dev.log.45.dr | Binary or memory string: idb: {Register Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf} 11:48:39.707 |
Source: setupapi.dev.log.45.dr | Binary or memory string: flq: Copying 'C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.sys' to 'C:\Windows\System32\drivers\vmci.sys'. |
Source: setupapi.dev.log.45.dr | Binary or memory string: set: System Manufacturer: VMware, Inc. |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\SysWOW64\setx.exe setx /M IDmelonMode access-key | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdoutCreationDisposition 4 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" status AccesskeyService | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" start AccesskeyService | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHid | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" install "C:\Program Files (x86)\IDmelon\Accesskey\driver\accesskeyfidovhid.inf" root\AccessKeyFidoVhid | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" status AccesskeyService | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe | Process created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Process created: C:\Windows\System32\dsregcmd.exe "C:\Windows\System32\dsregcmd.exe" /status | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Logger.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\log4net.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\IDmelonVirtualHidAPI.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\TagReaderGRPC.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.Api.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\ServerApi.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Encryption.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\RestSharp.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Newtonsoft.Json.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\DeviceId.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Json.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Threading.Tasks.Extensions.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Runtime.CompilerServices.Unsafe.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Google.Protobuf.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Memory.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Fido.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Suprema.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\BioKey.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\DB.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLite-net.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.core.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.batteries_v2.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.provider.dynamic_cdecl.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.InteropServices.RuntimeInformation\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Runtime.InteropServices.RuntimeInformation.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.ValueTuple.dll VolumeInformation | |
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe | Queries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Driver\wudf.cat VolumeInformation | |
Source: C:\Windows\System32\drvinst.exe | Queries volume information: C:\Windows\System32\DriverStore\Temp\{2b66b655-e0ff-c54b-ab20-dac488c814f3}\wudf.cat VolumeInformation | |