Source: | Binary string: wkernel32.pdb source: svchost.exe, 00000017.00000003.2834504386.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834599902.00000000055C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdb source: svchost.exe, 00000017.00000003.2834829148.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2835005025.00000000056C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: svchost.exe, 00000017.00000003.2832491103.0000000005690000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2831166176.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: svchost.exe, 00000017.00000003.2834244733.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834057943.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: svchost.exe, 00000017.00000003.2832491103.0000000005690000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2831166176.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: svchost.exe, 00000017.00000003.2834244733.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834057943.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdbUGP source: svchost.exe, 00000017.00000003.2834829148.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2835005025.00000000056C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernel32.pdbUGP source: svchost.exe, 00000017.00000003.2834504386.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834599902.00000000055C0000.00000004.00000001.00020000.00000000.sdmp |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0 |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://crl.globalsign.net/root-r3.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0 |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0A |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0C |
Source: eRApzqPkL1.exe | String found in binary or memory: http://ocsp.digicert.com0X |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20 |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0 |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, Portugal.com, 0000000C.00000000.2266654185.0000000000E65000.00000002.00000001.01000000.00000006.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: http://www.autoitscript.com/autoit3/X |
Source: eRApzqPkL1.exe | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: svchost.exe, 00000017.00000002.2846207864.0000000002CFC000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://154.216.17.46:3673/d3b272a7b40f3260049/em9u4u7h.8gawg |
Source: svchost.exe, 00000017.00000002.2846207864.0000000002CFC000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://154.216.17.46:3673/d3b272a7b40f3260049/em9u4u7h.8gawgx |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: Portugal.com.2.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: eRApzqPkL1.exe, 00000000.00000003.2215132858.0000000002944000.00000004.00000020.00020000.00000000.sdmp, eRApzqPkL1.exe, 00000000.00000002.2278488180.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Clothing.0.dr, Portugal.com.2.dr | String found in binary or memory: https://www.globalsign.com/repository/06 |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Code function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_004050CD |
Source: unknown | Process created: C:\Users\user\Desktop\eRApzqPkL1.exe "C:\Users\user\Desktop\eRApzqPkL1.exe" | |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Spokesman Spokesman.cmd & Spokesman.cmd | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 223565 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADMINISTRATORPAYMENTHOSPITALSUSA" Representatives | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Hand + ..\Articles + ..\Lithuania + ..\Arnold + ..\Grande + ..\Compatible + ..\Caused + ..\Benchmark + ..\Enclosure N | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\223565\Portugal.com Portugal.com N | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7052 -s 972 | |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Spokesman Spokesman.cmd & Spokesman.cmd | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 223565 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADMINISTRATORPAYMENTHOSPITALSUSA" Representatives | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Hand + ..\Articles + ..\Lithuania + ..\Arnold + ..\Grande + ..\Compatible + ..\Caused + ..\Benchmark + ..\Enclosure N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\223565\Portugal.com Portugal.com N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\choice.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: | Binary string: wkernel32.pdb source: svchost.exe, 00000017.00000003.2834504386.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834599902.00000000055C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdb source: svchost.exe, 00000017.00000003.2834829148.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2835005025.00000000056C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: svchost.exe, 00000017.00000003.2832491103.0000000005690000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2831166176.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: svchost.exe, 00000017.00000003.2834244733.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834057943.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: svchost.exe, 00000017.00000003.2832491103.0000000005690000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2831166176.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: svchost.exe, 00000017.00000003.2834244733.0000000005640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834057943.00000000054A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdbUGP source: svchost.exe, 00000017.00000003.2834829148.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2835005025.00000000056C0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernel32.pdbUGP source: svchost.exe, 00000017.00000003.2834504386.00000000054A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.2834599902.00000000055C0000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D318C0 push ebp; retf | 23_3_02D318C1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D328ED push ebx; ret | 23_3_02D328E4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D3588E push eax; iretd | 23_3_02D3589D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D358BC pushad ; ret | 23_3_02D358C1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D3225D push eax; ret | 23_3_02D3225F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D36012 push 00000038h; iretd | 23_3_02D3601D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D35606 pushad ; retf | 23_3_02D35619 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D30FEA push eax; ret | 23_3_02D30FF5 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D35FEE push FFFFFFD2h; retf | 23_3_02D36011 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D3278B push ebx; ret | 23_3_02D328E4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D31179 push FFFFFF82h; iretd | 23_3_02D3117B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D35F0C push es; iretd | 23_3_02D35F0D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 23_3_02D34920 push 0000002Eh; iretd | 23_3_02D34922 |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | Jump to behavior |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TORUNS.EXEDUMPCAP.EXEDE4DOT.EXEHOOKEXPLORER.EXE |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXE |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DNSPY.EXEPETOOLS.EXEAUTO |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: NITYDEBUGGER.EXEWINDUMP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEPROCESSHA |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PETOOLS.EXE |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDUMP.EXE |
Source: svchost.exe, 00000017.00000002.2846547385.0000000003300000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE |
Source: C:\Users\user\Desktop\eRApzqPkL1.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Spokesman Spokesman.cmd & Spokesman.cmd | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 223565 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADMINISTRATORPAYMENTHOSPITALSUSA" Representatives | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Hand + ..\Articles + ..\Lithuania + ..\Arnold + ..\Grande + ..\Compatible + ..\Caused + ..\Benchmark + ..\Enclosure N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\223565\Portugal.com Portugal.com N | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\223565\Portugal.com | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |