Source: | Binary string: wkernel32.pdb source: svchost.exe, 00000014.00000003.2724027359.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723917162.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdb source: svchost.exe, 00000014.00000003.2724286072.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2724509683.0000000005740000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: svchost.exe, 00000014.00000003.2722710960.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723082299.0000000005710000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: svchost.exe, 00000014.00000003.2723629901.00000000056C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723402053.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: svchost.exe, 00000014.00000003.2722710960.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723082299.0000000005710000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: svchost.exe, 00000014.00000003.2723629901.00000000056C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723402053.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdbUGP source: svchost.exe, 00000014.00000003.2724286072.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2724509683.0000000005740000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernel32.pdbUGP source: svchost.exe, 00000014.00000003.2724027359.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723917162.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0 |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://crl.globalsign.net/root-r3.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0A |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0C |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0X |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20 |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0 |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, Portugal.com, 0000000D.00000000.2262834094.0000000000DA5000.00000002.00000001.01000000.00000006.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: http://www.autoitscript.com/autoit3/X |
Source: eRApzqPkL1.exe | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: svchost.exe, 00000014.00000002.2733300626.0000000002D7C000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://154.216.17.46:3673/d3b272a7b40f3260049/em9u4u7h.8gawg |
Source: svchost.exe, 00000014.00000002.2733300626.0000000002D7C000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://154.216.17.46:3673/d3b272a7b40f3260049/em9u4u7h.8gawgx |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: Clothing.1.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: eRApzqPkL1.exe, 00000001.00000003.2205066091.000000000297B000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000001.00000002.2222711879.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Portugal.com.3.dr, Clothing.1.dr | String found in binary or memory: https://www.globalsign.com/repository/06 |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Code function: 1_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, | 1_2_004050CD |
Source: unknown | Process created: C:\Users\user\Desktop\eRApzqPkL1.exe "C:\Users\user\Desktop\eRApzqPkL1.exe" | |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Spokesman Spokesman.cmd & Spokesman.cmd | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 223565 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADMINISTRATORPAYMENTHOSPITALSUSA" Representatives | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Hand + ..\Articles + ..\Lithuania + ..\Arnold + ..\Grande + ..\Compatible + ..\Caused + ..\Benchmark + ..\Enclosure N | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\223565\Portugal.com Portugal.com N | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7924 -s 980 | |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Spokesman Spokesman.cmd & Spokesman.cmd | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 223565 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADMINISTRATORPAYMENTHOSPITALSUSA" Representatives | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Hand + ..\Articles + ..\Lithuania + ..\Arnold + ..\Grande + ..\Compatible + ..\Caused + ..\Benchmark + ..\Enclosure N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\223565\Portugal.com Portugal.com N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\choice.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: | Binary string: wkernel32.pdb source: svchost.exe, 00000014.00000003.2724027359.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723917162.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdb source: svchost.exe, 00000014.00000003.2724286072.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2724509683.0000000005740000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: svchost.exe, 00000014.00000003.2722710960.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723082299.0000000005710000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: svchost.exe, 00000014.00000003.2723629901.00000000056C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723402053.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: svchost.exe, 00000014.00000003.2722710960.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723082299.0000000005710000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: svchost.exe, 00000014.00000003.2723629901.00000000056C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723402053.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdbUGP source: svchost.exe, 00000014.00000003.2724286072.0000000005520000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2724509683.0000000005740000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernel32.pdbUGP source: svchost.exe, 00000014.00000003.2724027359.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2723917162.0000000005520000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB18C0 push ebp; retf | 20_3_02DB18C1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB28ED push ebx; ret | 20_3_02DB28E4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB588E push eax; iretd | 20_3_02DB589D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB58BC pushad ; ret | 20_3_02DB58C1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB225D push eax; ret | 20_3_02DB225F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB6012 push 00000038h; iretd | 20_3_02DB601D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB5606 pushad ; retf | 20_3_02DB5619 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB0FEA push eax; ret | 20_3_02DB0FF5 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB5FEE push FFFFFFD2h; retf | 20_3_02DB6011 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB278B push ebx; ret | 20_3_02DB28E4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB1179 push FFFFFF82h; iretd | 20_3_02DB117B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB5F0C push es; iretd | 20_3_02DB5F0D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 20_3_02DB4920 push 0000002Eh; iretd | 20_3_02DB4922 |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: svchost.exe, 00000014.00000002.2733711262.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EIDA.EXEIDA64.EXEIMMUNITYDEBUGGER.EXEWINDUMP.EXEX64DBG.EXEX32DBG.E |
Source: svchost.exe, 00000014.00000002.2733711262.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: svchost.exe, 00000014.00000002.2733711262.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNS.EXE |
Source: svchost.exe, 00000014.00000002.2733711262.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDUMP.EXE |
Source: svchost.exe, 00000014.00000002.2733711262.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HACKER.EXEIDAQ64.EXEAUTORUNS.EXEDUMPCAP.EXEDE4 |
Source: svchost.exe, 00000014.00000002.2733711262.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Spokesman Spokesman.cmd & Spokesman.cmd | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 223565 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADMINISTRATORPAYMENTHOSPITALSUSA" Representatives | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Hand + ..\Articles + ..\Lithuania + ..\Arnold + ..\Grande + ..\Compatible + ..\Caused + ..\Benchmark + ..\Enclosure N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\223565\Portugal.com Portugal.com N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |