Source: C:\Program Files (x86)\AutoIt3\Au3Info_x64.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\AutoIt3\AutoIt3Help.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Java\jre-1.8\bin\jjs.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Java\jre-1.8\bin\javacpl.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateCore.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaws.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\AutoIt3\AutoIt3_x64.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Java\jre-1.8\bin\jabswitch.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaws.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java-rmi.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\117.0.5938.132\117.0.5938.132_chrome_installer.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateBroker.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdate.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: C:\Program Files (x86)\AutoIt3\Au3Info.exe | Avira: detection malicious, Label: W32/Infector.Gen |
Source: | Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\armsvc.pdb source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000003.1661345317.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe.0.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\AcrobatInfo.pdb source: armsvc.exe, 00000001.00000003.1918851926.0000000001F60000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: ssh-agent.pdb source: armsvc.exe, 00000001.00000003.1789345540.0000000002050000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\TextExtractor.pdb444 source: armsvc.exe, 00000001.00000003.2033681360.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\TextExtractor.pdb source: armsvc.exe, 00000001.00000003.2033681360.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: vssvc.pdb source: WBEngine.0.etl.23.dr, VSSVC.exe.1.dr |
Source: | Binary string: msiexec.pdbGCTL source: armsvc.exe, 00000001.00000003.1724571249.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\jjs_objs\jjs.pdb source: jjs.exe.1.dr |
Source: | Binary string: PresentationFontCache.pdb source: armsvc.exe, 00000001.00000003.1695308775.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: mavinject32.pdbGCTL source: armsvc.exe, 00000001.00000003.2283149621.00000000008F0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2278981032.00000000008F0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: PerceptionSimulationService.pdb source: armsvc.exe, 00000001.00000003.1731714155.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: MicrosoftEdgeUpdateBroker_unsigned.pdb source: MicrosoftEdgeUpdateBroker.exe.1.dr |
Source: | Binary string: wntdll.pdb source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000003.1669961258.0000000004090000.00000004.00001000.00020000.00000000.sdmp, REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000003.1669485567.00000000041F0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: Spectrum.pdb source: Spectrum.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\WebInstaller\AcroMiniServicesUpdater.pdb source: armsvc.exe, 00000001.00000003.2007127631.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: MsSense.pdbGCTL source: armsvc.exe, 00000001.00000003.1753798899.00000000021E0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: MsSense.pdb source: armsvc.exe, 00000001.00000003.1753798899.00000000021E0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\dbs\el\omr\Target\x64\ship\click2run\x-none\InspectorOfficeGadget.pdb source: armsvc.exe, 00000001.00000003.2264919855.00000000008F0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\Acrobat\Installers\ShowAppPickerForPDF\Release_x64\ShowAppPickerForPDF.pdb source: armsvc.exe, 00000001.00000003.2186860033.0000000000A80000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2194688859.0000000000680000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\tnameserv_objs\tnameserv.pdb source: tnameserv.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\AcrobatExe.pdb source: Acrobat.exe.1.dr |
Source: | Binary string: DiagnosticsHub.StandardCollector.Service.pdbGCTL source: armsvc.exe, 00000001.00000003.1685892753.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\rmid_objs\rmid.pdb source: rmid.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\AcroBroker.pdb source: armsvc.exe, 00000001.00000003.1941028888.0000000001F60000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: Acrobat_SL.pdb source: armsvc.exe, 00000001.00000003.1927307641.0000000001F60000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: maintenanceservice.pdb source: armsvc.exe, 00000001.00000003.1713030613.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: PerfHost.pdbGCTL source: armsvc.exe, 00000001.00000003.1739406959.0000000002000000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1740521550.0000000002080000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1743596231.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\dbs\el\omr\Target\x64\ship\click2run\x-none\InspectorOfficeGadget.pdbY source: armsvc.exe, 00000001.00000003.2264919855.00000000008F0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\WCChromeNativeMessagingHost.pdb source: armsvc.exe, 00000001.00000003.2077685079.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\rmid_objs\rmid.pdb source: rmid.exe.1.dr |
Source: | Binary string: PerfHost.pdb source: armsvc.exe, 00000001.00000003.1739406959.0000000002000000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1740521550.0000000002080000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1743596231.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\workspace\CR-Windows-x64-Client-Builder\x64\Release\CRWindowsClientService.pdb source: armsvc.exe, 00000001.00000003.2099016563.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\tnameserv_objs\tnameserv.pdb source: tnameserv.exe.1.dr |
Source: | Binary string: D:\T\Acrobat\Installers\ShowAppPickerForPDF\Release_x64\ShowAppPickerForPDF.pdb$$ source: armsvc.exe, 00000001.00000003.2186860033.0000000000A80000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2194688859.0000000000680000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000003.1669961258.0000000004090000.00000004.00001000.00020000.00000000.sdmp, REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000003.1669485567.00000000041F0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: TieringEngineService.pdb source: armsvc.exe, 00000001.00000003.1803769593.0000000002050000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: TieringEngineService.pdbGCTL source: armsvc.exe, 00000001.00000003.1803769593.0000000002050000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\e\src\out\Release_x64\notification_helper.exe.pdbOGP source: notification_click_helper.exe.1.dr |
Source: | Binary string: ALG.pdb source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000003.1664964581.0000000003E90000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: uudf.pdb source: WBEngine.0.etl.23.dr |
Source: | Binary string: msdtcexe.pdb source: armsvc.exe, 00000001.00000003.1719283145.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: DiagnosticsHub.StandardCollector.Service.pdb source: armsvc.exe, 00000001.00000003.1685892753.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: vssvc.pdbUGP source: VSSVC.exe.1.dr |
Source: | Binary string: snmptrap.pdb source: armsvc.exe, 00000001.00000003.1766189016.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release\Plug_ins\pi_brokers\32BitMAPIBroker.pdb source: armsvc.exe, 00000001.00000003.2149428363.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: AppVShNotify.pdbGCTL source: armsvc.exe, 00000001.00000003.2259110145.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\work\p4\splinters\Splinters\S\BuildResults\bin\Win32\ReaderRelease\FullTrustNotifier\FullTrustNotifier.pdb77.GCTL source: armsvc.exe, 00000001.00000003.2179775011.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: E:\PkgInstaller\base\ntsetup\SrvPack.Main\tools\sfxcab\sfxcab\objfre\i386\sfxcab.pdb source: armsvc.exe, 00000001.00000003.2231521941.0000000000A80000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2240478755.0000000000680000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2230232591.0000000000A70000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: msiexec.pdb source: armsvc.exe, 00000001.00000003.1724571249.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: ADelRCP_Exec.pdb source: armsvc.exe, 00000001.00000003.2047861389.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\rmiregistry_objs\rmiregistry.pdb source: rmiregistry.exe.1.dr |
Source: | Binary string: D:\a\_work\e\src\out\Release_x64\notification_helper.exe.pdb source: notification_click_helper.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\plug_ins\pi_brokers\MSRMSPIBroker.pdbAAAGCTL source: armsvc.exe, 00000001.00000003.2173687677.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: WmiApSrv.pdbGCTL source: armsvc.exe, 00000001.00000003.1843747146.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: GoogleUpdateOnDemand_unsigned.pdb source: GoogleUpdateOnDemand.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\WCChromeNativeMessagingHost.pdb888 source: armsvc.exe, 00000001.00000003.2077685079.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\deploy\tmp\javacplexec\obj\javacpl.pdb source: javacpl.exe.1.dr |
Source: | Binary string: Acrobat_SL.pdb((( source: armsvc.exe, 00000001.00000003.1927307641.0000000001F60000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: Spectrum.pdbGCTL source: Spectrum.exe.1.dr |
Source: | Binary string: locator.pdb source: armsvc.exe, 00000001.00000003.1745305912.0000000002000000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1750025499.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: ADelRCP_Exec.pdbCC9 source: armsvc.exe, 00000001.00000003.2047861389.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: wbengine.pdb source: WBEngine.0.etl.23.dr |
Source: | Binary string: E:\PkgInstaller\base\ntsetup\SrvPack.Main\tools\sfxcab\sfxcab\objfre\i386\sfxcab.pdbU source: armsvc.exe, 00000001.00000003.2231521941.0000000000A80000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2240478755.0000000000680000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2230232591.0000000000A70000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\deploy\tmp\javacplexec\obj\javacpl.pdb774 source: javacpl.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\WebInstaller\AcroMiniServicesUpdater.pdbT source: armsvc.exe, 00000001.00000003.2007127631.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\workspace\CR-Windows-x64-Client-Builder\x64\Release\CRWindowsClientService.pdbGG source: armsvc.exe, 00000001.00000003.2099016563.0000000000A00000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\AcrobatInfo.pdb))) source: armsvc.exe, 00000001.00000003.1918851926.0000000001F60000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\jjs_objs\jjs.pdb source: jjs.exe.1.dr |
Source: | Binary string: mavinject32.pdb source: armsvc.exe, 00000001.00000003.2283149621.00000000008F0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2278981032.00000000008F0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: snmptrap.pdbGCTL source: armsvc.exe, 00000001.00000003.1766189016.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: PerceptionSimulationService.pdbGCTL source: armsvc.exe, 00000001.00000003.1731714155.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: msdtcexe.pdbGCTL source: armsvc.exe, 00000001.00000003.1719283145.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: 64BitMAPIBroker.pdb source: armsvc.exe, 00000001.00000003.2160709430.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: E:\jenkins\workspace\NGL_WORKFLOW\build\master\win64\Release\Acrobat\project\win\ngl-workflow\x64\Release (Acrobat)\adobe_licensing_wf_helper_acro.pdb source: armsvc.exe, 00000001.00000003.2143704164.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\Acrobat\Installers\ADNotificationManager\Viewer Release_x64\ADNotificationManager.pdb source: ADNotificationManager.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release\Plug_ins\pi_brokers\32BitMAPIBroker.pdb@@ source: armsvc.exe, 00000001.00000003.2149428363.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\work\p4\splinters\Splinters\S\BuildResults\bin\Win32\ReaderRelease\FullTrustNotifier\FullTrustNotifier.pdb source: armsvc.exe, 00000001.00000003.2179775011.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: ifsutil.pdb source: WBEngine.0.etl.23.dr |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\klist_objs\klist.pdb source: klist.exe.1.dr |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\plug_ins\pi_brokers\MSRMSPIBroker.pdb source: armsvc.exe, 00000001.00000003.2173687677.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: maintenanceservice.pdb` source: armsvc.exe, 00000001.00000003.1713030613.0000000002080000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: udfs.pdb source: WBEngine.0.etl.23.dr |
Source: | Binary string: WmiApSrv.pdb source: armsvc.exe, 00000001.00000003.1843747146.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\Eula.pdb source: armsvc.exe, 00000001.00000003.2106165754.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\rmiregistry_objs\rmiregistry.pdb source: rmiregistry.exe.1.dr |
Source: | Binary string: ALG.pdbGCTL source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000003.1664964581.0000000003E90000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: PresentationFontCache.pdbHt^t Pt_CorExeMainmscoree.dll source: armsvc.exe, 00000001.00000003.1695308775.0000000002000000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: locator.pdbGCTL source: armsvc.exe, 00000001.00000003.1745305912.0000000002000000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1750025499.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\AcroBroker.pdbTTT source: armsvc.exe, 00000001.00000003.1941028888.0000000001F60000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\Acrobat\Installers\ADNotificationManager\Viewer Release_x64\ADNotificationManager.pdb22 source: ADNotificationManager.exe.1.dr |
Source: | Binary string: c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\jdk\objs\klist_objs\klist.pdb source: klist.exe.1.dr |
Source: | Binary string: ssh-agent.pdbX source: armsvc.exe, 00000001.00000003.1789345540.0000000002050000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: AppVShNotify.pdb source: armsvc.exe, 00000001.00000003.2259110145.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\T\BuildResults\bin\Release_x64\Eula.pdb888 source: armsvc.exe, 00000001.00000003.2106165754.0000000000A80000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: vssapi.pdb source: WBEngine.0.etl.23.dr |
Source: | Binary string: spp.pdb source: WBEngine.0.etl.23.dr |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\wbem\WmiApSrv.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Google\Chrome\Application\117.0.5938.132\chrome_pwa_launcher.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Google\Chrome\Application\117.0.5938.132\Installer\chrmstp.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\AutoIt3\AutoIt3_x64.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\minidump-analyzer.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\pingsender.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\vds.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Google\Chrome\Application\117.0.5938.132\Installer\setup.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\x86\Acrobat\Acrobat.exe | Jump to behavior |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | System file written: C:\Windows\System32\alg.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\7-Zip\7zFM.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins\pi_brokers\32BitMAPIBroker.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\snmptrap.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\Spectrum.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Windows Media Player\wmpnetwk.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\Locator.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\default-browser-agent.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\LogTransport2.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\Eula.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\7-Zip\7z.exe | Jump to behavior |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | System file written: C:\Windows\System32\AppVClient.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\Adobe\Acrobat\Setup\{AC76BA86-1033-1033-7760-BC15014EA700}\WindowsInstaller-KB893803-v2-x86.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\crashreporter.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\CRWindowsClientService.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins\pi_brokers\64BitMAPIBroker.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\SysWOW64\perfhost.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\7-Zip\7zG.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\msiexec.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins\pi_brokers\MSRMSPIBroker.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\CRLogTransport.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\AutoIt3\AutoIt3Help.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\VSSVC.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\wbengine.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\AcroCEF.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\SearchIndexer.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Google\Chrome\Application\117.0.5938.132\notification_helper.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroTextExtractor.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\private_browsing.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\maintenanceservice.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\TieringEngineService.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\firefox.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\AutoIt3\Au3Info.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow\adobe_licensing_wf_acro.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroBroker.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\updater.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\ShowAppPickerForPDF.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\AutoIt3\Au3Check.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Google\Chrome\Application\117.0.5938.132\elevation_service.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\AgentService.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\ADNotificationManager.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\ADelRCP.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\SingleClientServicesUpdater.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\7-Zip\Uninstall.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Google\Chrome\Application\chrome_proxy.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\Adobe\Acrobat\Setup\{AC76BA86-1033-1033-7760-BC15014EA700}\setup.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\FXSSVC.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow\adobe_licensing_wf_helper_acro.exe | Jump to behavior |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | System file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgr.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\OpenSSH\ssh-agent.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\SingleClientServicesUpdater.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\SensorDataService.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Windows\System32\msdtc.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe | Jump to behavior |
Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | System file written: C:\Program Files\Mozilla Firefox\plugin-container.exe | Jump to behavior |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0046445A |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0046C6D1 FindFirstFileW,FindClose, | 0_2_0046C6D1 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_0046C75C |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0046EF95 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0046F0F2 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0046F3F3 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_004637EF |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_00463B12 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_0046BCBC |
Source: global traffic | HTTP traffic detected: POST /vayts HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: pywolwnvd.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: POST /ndknji HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: ssbzmoy.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /dy HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: cvgrf.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /un HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: npukfztj.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic | HTTP traffic detected: POST /vuox HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: przvgke.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: GET /vuox HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Host: ww99.przvgke.biz |
Source: global traffic | HTTP traffic detected: GET /vuox?usid=25&utid=8251791979 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Host: ww12.przvgke.biz |
Source: global traffic | HTTP traffic detected: POST /asgidloooxieajf HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: przvgke.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: GET /asgidloooxieajf HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Host: ww99.przvgke.biz |
Source: global traffic | HTTP traffic detected: GET /asgidloooxieajf?usid=25&utid=8251792691 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Host: ww12.przvgke.biz |
Source: global traffic | HTTP traffic detected: POST /sjqomgqqk HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: knjghuig.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /rdnh HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: lpuegx.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /at HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: lpuegx.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /v HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: vjaxhpbji.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /tcmuebmfxhuj HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: vjaxhpbji.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /jsoiayboaqe HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: xlfhhhm.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /mmbextsivoeuyvtt HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: ifsaia.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /xoqfqirqhp HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: saytjshyf.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /kknpblsbxdrrjko HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: vcddkls.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: POST /wxalwqn HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: fwiwk.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 850 |
Source: global traffic | HTTP traffic detected: GET /wxalwqn HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Host: ww99.fwiwk.biz |
Source: armsvc.exe, 00000001.00000003.1840081813.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://172.234.222.138/ |
Source: armsvc.exe, 00000001.00000003.1840081813.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://172.234.222.138/asgidloooxieajf |
Source: armsvc.exe, 00000001.00000003.1840081813.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://172.234.222.138/asgidloooxieajf: |
Source: armsvc.exe, 00000001.00000003.1840081813.000000000071F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://172.234.222.138/asgidloooxieajfN |
Source: armsvc.exe, 00000001.00000003.1723140950.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1744244802.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://18.141.10.107/ |
Source: armsvc.exe, 00000001.00000003.2101953987.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://18.141.10.107/N |
Source: armsvc.exe, 00000001.00000003.1723140950.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://18.141.10.107/ndknji |
Source: armsvc.exe, 00000001.00000003.1764341618.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://44.221.84.105/3 |
Source: armsvc.exe, 00000001.00000003.1764341618.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://44.221.84.105/I |
Source: armsvc.exe, 00000001.00000003.1764341618.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://44.221.84.105/n |
Source: armsvc.exe, 00000001.00000003.1764341618.0000000000720000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1764341618.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://44.221.84.105/un |
Source: armsvc.exe, 00000001.00000003.1764341618.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://44.221.84.105/un3 |
Source: armsvc.exe, 00000001.00000003.1764341618.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://44.221.84.105/unj |
Source: armsvc.exe, 00000001.00000003.1744244802.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1700090715.0000000000737000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://54.244.188.177/ |
Source: armsvc.exe, 00000001.00000003.1744244802.0000000000735000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1744374270.0000000000737000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://54.244.188.177/dy |
Source: armsvc.exe, 00000001.00000003.1744244802.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://54.244.188.177/j |
Source: armsvc.exe, 00000001.00000003.1744244802.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1764341618.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://54.244.188.177/q |
Source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000002.1684737431.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000002.1685750618.0000000000D02000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1723140950.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://54.244.188.177/vayts |
Source: armsvc.exe, armsvc.exe, 00000001.00000003.2334989969.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2101953987.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://82.112.184.197/ |
Source: armsvc.exe, 00000001.00000003.2334989969.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://82.112.184.197/G |
Source: armsvc.exe, 00000001.00000003.2334989969.0000000000720000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://82.112.184.197/ath |
Source: armsvc.exe, 00000001.00000003.2101953987.0000000000735000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2101953987.000000000071F000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2102549025.0000000000737000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://82.112.184.197/rdnh |
Source: armsvc.exe, 00000001.00000003.2101953987.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://82.112.184.197/v |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.telegram.org |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000002.1686867266.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2917315050.0000000000402000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: armsvc.exe, 00000001.00000003.1821807650.0000000002330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww12.przvgke.biz/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTd8fHx8fHw2NzYwMjZjODc4 |
Source: armsvc.exe, 00000001.00000003.1834764163.00000000024B0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww12.przvgke.biz/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTd8fHx8fHw2NzYwMjZjOWVh |
Source: armsvc.exe, 00000001.00000003.1839091419.0000000000762000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1839091419.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1839586338.0000000000757000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww12.przvgke.biz/asgidloooxieajf?usid=25&utid=8251792691 |
Source: armsvc.exe, 00000001.00000003.1839091419.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1839586338.0000000000757000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww12.przvgke.biz/asgidloooxieajf?usid=25&utid=8251792691LocationETagAuthentication-InfoAgeAcc |
Source: armsvc.exe, 00000001.00000003.1839091419.0000000000762000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww12.przvgke.biz/vuox?usid=25&utid=8251791979 |
Source: armsvc.exe, 00000001.00000003.1840324999.0000000000737000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1840081813.0000000000735000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww12.przvgke.bize4-4079-b30a-7368302a1ad4h |
Source: armsvc.exe | String found in binary or memory: http://ww99.przvgke.biz/ |
Source: armsvc.exe, 00000001.00000003.1839091419.000000000074B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww99.przvgke.biz/asgidloooxieajf |
Source: armsvc.exe, 00000001.00000003.2334989969.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2101953987.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1840081813.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww99.przvgke.biz/asgidloooxieajf. |
Source: armsvc.exe, 00000001.00000003.2334989969.0000000000735000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2101953987.0000000000735000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2102549025.0000000000737000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1840324999.0000000000737000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1840081813.0000000000735000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww99.przvgke.biz/asgidloooxieajf= |
Source: armsvc.exe, 00000001.00000003.1878960828.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2100645926.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1842899589.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2334610256.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1839091419.000000000074B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww99.przvgke.biz/asgidloooxieajfLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedE |
Source: armsvc.exe, 00000001.00000003.2334989969.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2101953987.0000000000726000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1840081813.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww99.przvgke.biz/ox |
Source: armsvc.exe, 00000001.00000003.1878960828.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2102437401.0000000000752000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2100645926.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1842899589.000000000074B000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1839091419.000000000074B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ww99.przvgke.biz/vuox |
Source: Au3Info_x64.exe.1.dr | String found in binary or memory: http://www.autoitscript.com/autoit3/ |
Source: Au3Info_x64.exe.1.dr | String found in binary or memory: http://www.autoitscript.com/autoit3/8 |
Source: armsvc.exe, 00000001.00000003.1962127671.0000000001F60000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.winimage.com/zLibDll |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002A8F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2961862883.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002A8F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2961862883.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000002.1686867266.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2917315050.0000000000402000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id= |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendDocument?chat_id=5839 |
Source: Acrobat.exe.1.dr | String found in binary or memory: https://clients2.google.com/service/update2/crxBrowser |
Source: armsvc.exe, 00000001.00000003.2046016901.0000000000A00000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://clients2.google.com/service/update2/crxFailed |
Source: armsvc.exe, 00000001.00000003.2047123582.0000000000A00000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.2046894562.0000000000A00000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://clients2.google.com/service/update2/crxHKEY_LOCAL_MACHINE |
Source: Acrobat.exe.1.dr | String found in binary or memory: https://crbug.com/820996 |
Source: Acrobat.exe.1.dr | String found in binary or memory: https://crbug.com/820996LaunchElevatedProcessdisable-best-effort-tasksdisable-breakpaddisable-featur |
Source: armsvc.exe, 00000001.00000003.1834764163.00000000024B0000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1834519561.0000000002060000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1821807650.0000000002330000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1821644148.0000000002060000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://euob.netgreencolumn.com/sxp/i/c4601e5f6cdd73216cafdd5af209201c.js |
Source: notification_click_helper.exe.1.dr | String found in binary or memory: https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ff |
Source: notification_click_helper.exe.1.dr | String found in binary or memory: https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffDilithium2Dilith |
Source: armsvc.exe, 00000001.00000003.1834764163.00000000024B0000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1834519561.0000000002060000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1821807650.0000000002330000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1821644148.0000000002060000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://parking3.parklogic.com/page/enhance.js?pcId=12&domain=przvgke.biz |
Source: armsvc.exe, 00000001.00000003.1834764163.00000000024B0000.00000004.00000020.00020000.00000000.sdmp, armsvc.exe, 00000001.00000003.1821807650.0000000002330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pcnatrk.net/track. |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002A61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: REQUEST FOR QUOTATION 1307-RFQ.exe, 00000000.00000002.1686867266.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2917315050.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2961862883.0000000002A61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002A61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: RegSvcs.exe, 00000002.00000002.2961862883.0000000002A61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189=4 |
Source: AutoIt3Help.exe.1.dr | String found in binary or memory: https://www.autoitscript.com/site/autoit/8 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0040E6A0 | 0_2_0040E6A0 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0042D975 | 0_2_0042D975 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0040FCE0 | 0_2_0040FCE0 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_004221C5 | 0_2_004221C5 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_004362D2 | 0_2_004362D2 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_004803DA | 0_2_004803DA |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0043242E | 0_2_0043242E |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_004225FA | 0_2_004225FA |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0045E616 | 0_2_0045E616 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_004166E1 | 0_2_004166E1 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0043878F | 0_2_0043878F |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00436844 | 0_2_00436844 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00480857 | 0_2_00480857 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00418808 | 0_2_00418808 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00468889 | 0_2_00468889 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0042CB21 | 0_2_0042CB21 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_004ECCC8 | 0_2_004ECCC8 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00436DB6 | 0_2_00436DB6 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00416F9E | 0_2_00416F9E |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00413030 | 0_2_00413030 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0042F1D9 | 0_2_0042F1D9 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00423187 | 0_2_00423187 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00401287 | 0_2_00401287 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00421484 | 0_2_00421484 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00415520 | 0_2_00415520 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00427696 | 0_2_00427696 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00415760 | 0_2_00415760 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00421978 | 0_2_00421978 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00439AB5 | 0_2_00439AB5 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00487DDB | 0_2_00487DDB |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00421D90 | 0_2_00421D90 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0042BDA6 | 0_2_0042BDA6 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_0040DF00 | 0_2_0040DF00 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00413FE0 | 0_2_00413FE0 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00B200D9 | 0_2_00B200D9 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00AE6EAF | 0_2_00AE6EAF |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00AE51EE | 0_2_00AE51EE |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00B1D580 | 0_2_00B1D580 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00B13780 | 0_2_00B13780 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00B1C7F0 | 0_2_00B1C7F0 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00B239A3 | 0_2_00B239A3 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00B15980 | 0_2_00B15980 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00AE7B71 | 0_2_00AE7B71 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00AE7F80 | 0_2_00AE7F80 |
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION 1307-RFQ.exe | Code function: 0_2_00C93668 | 0_2_00C93668 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028B4328 | 2_2_028B4328 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028B27B9 | 2_2_028B27B9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028B8DA0 | 2_2_028B8DA0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028B5968 | 2_2_028B5968 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028B5F90 | 2_2_028B5F90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_028B2DD1 | 2_2_028B2DD1 |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Code function: 7_2_009BA810 | 7_2_009BA810 |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Code function: 7_2_00997C00 | 7_2_00997C00 |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Code function: 7_2_009979F0 | 7_2_009979F0 |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Code function: 7_2_009C2D40 | 7_2_009C2D40 |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Code function: 7_2_009BEEB0 | 7_2_009BEEB0 |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Code function: 7_2_009B92A0 | 7_2_009B92A0 |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Code function: 7_2_009B93B0 | 7_2_009B93B0 |
Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Code function: 8_2_01ED79F0 | 8_2_01ED79F0 |
Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Code function: 8_2_01F02D40 | 8_2_01F02D40 |
Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Code function: 8_2_01ED7C00 | 8_2_01ED7C00 |
Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Code function: 8_2_01EFA810 | 8_2_01EFA810 |
Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Code function: 8_2_01EF93B0 | 8_2_01EF93B0 |
Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Code function: 8_2_01EF92A0 | 8_2_01EF92A0 |
Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | Code function: 8_2_01EFEEB0 | 8_2_01EFEEB0 |
Source: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Code function: 10_2_00BAA810 | 10_2_00BAA810 |
Source: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Code function: 10_2_00B87C00 | 10_2_00B87C00 |
Source: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Code function: 10_2_00B879F0 | 10_2_00B879F0 |
Source: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Code function: 10_2_00BB2D40 | 10_2_00BB2D40 |
Source: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Code function: 10_2_00BAEEB0 | 10_2_00BAEEB0 |
Source: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Code function: 10_2_00BA92A0 | 10_2_00BA92A0 |
Source: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe | Code function: 10_2_00BA93B0 | 10_2_00BA93B0 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_00956EAF | 11_2_00956EAF |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_00985980 | 11_2_00985980 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_009939A3 | 11_2_009939A3 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_009551EE | 11_2_009551EE |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_0098D580 | 11_2_0098D580 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_00957F80 | 11_2_00957F80 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_00983780 | 11_2_00983780 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_0098C7F0 | 11_2_0098C7F0 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_00989290 | 11_2_00989290 |
Source: C:\Windows\SysWOW64\perfhost.exe | Code function: 11_2_00987B80 | 11_2_00987B80 |
Source: C:\Windows\System32\Spectrum.exe | Code function: 15_2_0056A810 | 15_2_0056A810 |
Source: C:\Windows\System32\Spectrum.exe | Code function: 15_2_00547C00 | 15_2_00547C00 |
Source: C:\Windows\System32\Spectrum.exe | Code function: 15_2_00572D40 | 15_2_00572D40 |
Source: C:\Windows\System32\Spectrum.exe | Code function: 15_2_005479F0 | 15_2_005479F0 |
Source: C:\Windows\System32\Spectrum.exe | Code function: 15_2_0056EEB0 | 15_2_0056EEB0 |
Source: C:\Windows\System32\Spectrum.exe | Code function: 15_2_005692A0 | 15_2_005692A0 |
Source: C:\Windows\System32\Spectrum.exe | Code function: 15_2_005693B0 | 15_2_005693B0 |
Source: C:\Windows\System32\OpenSSH\ssh-agent.exe | Code function: 17_2_00D3A810 | 17_2_00D3A810 |
Source: C:\Windows\System32\OpenSSH\ssh-agent.exe | Code function: 17_2_00D17C00 | 17_2_00D17C00 |
Source: C:\Windows\System32\OpenSSH\ssh-agent.exe | Code function: 17_2_00D179F0 | 17_2_00D179F0 |
Source: C:\Windows\System32\OpenSSH\ssh-agent.exe | Code function: 17_2_00D42D40 | 17_2_00D42D40 |
Source: C:\Windows\System32\OpenSSH\ssh-agent.exe | Code function: 17_2_00D3EEB0 | 17_2_00D3EEB0 |
Source: C:\Windows\System32\OpenSSH\ssh-agent.exe | Code function: 17_2_00D392A0 | 17_2_00D392A0 |
Source: C:\Windows\System32\OpenSSH\ssh-agent.exe | Code function: 17_2_00D393B0 | 17_2_00D393B0 |
Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.REQUEST FOR QUOTATION 1307-RFQ.exe.3ee0000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.REQUEST FOR QUOTATION 1307-RFQ.exe.3ee0000.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.REQUEST FOR QUOTATION 1307-RFQ.exe.3ee0000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.REQUEST FOR QUOTATION 1307-RFQ.exe.3ee0000.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.1686867266.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1686867266.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.2917315050.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: REQUEST FOR QUOTATION 1307-RFQ.exe PID: 7292, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: REQUEST FOR QUOTATION 1307-RFQ.exe | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: armsvc.exe.0.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: alg.exe.0.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: AppVClient.exe.0.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: default-browser-agent.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: firefox.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javaws.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleCrashHandler.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleCrashHandler64.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdate.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateBroker.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateComRegisterShell64.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateCore.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: maintenanceservice.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateOnDemand.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: minidump-analyzer.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: 117.0.5938.132_chrome_installer.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: pingsender.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: jabswitch.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: plugin-container.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: private_browsing.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: updater.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Au3Info.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: FXSSVC.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Au3Info_x64.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: elevation_service.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: elevation_service.exe0.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: maintenanceservice.exe0.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msdtc.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msiexec.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: PerceptionSimulationService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: perfhost.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: java-rmi.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: java.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javacpl.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javaw.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javaws.exe0.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: jjs.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: jp2launcher.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: keytool.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: kinit.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: klist.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: DiagnosticsHub.StandardCollector.Service.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Locator.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: MsSense.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: SensorDataService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: snmptrap.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Spectrum.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ssh-agent.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: TieringEngineService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: AgentService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: vds.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: VSSVC.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ktab.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: orbd.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: pack200.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: policytool.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: rmid.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: rmiregistry.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: servertool.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ssvagent.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: tnameserv.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: unpack200.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: wbengine.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: WmiApSrv.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: wmpnetwk.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: SearchIndexer.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: 7z.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: 7zFM.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ie_to_edge_stub.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: cookie_exporter.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: identity_helper.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: setup.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msedgewebview2.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msedge_proxy.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: REQUEST FOR QUOTATION 1307-RFQ.exe | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: armsvc.exe.0.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: alg.exe.0.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: AppVClient.exe.0.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: default-browser-agent.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: firefox.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javaws.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleCrashHandler.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleCrashHandler64.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdate.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateBroker.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateComRegisterShell64.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateCore.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: maintenanceservice.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: GoogleUpdateOnDemand.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: minidump-analyzer.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: 117.0.5938.132_chrome_installer.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: pingsender.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: jabswitch.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: plugin-container.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: private_browsing.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: updater.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Au3Info.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: FXSSVC.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Au3Info_x64.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: elevation_service.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: elevation_service.exe0.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: maintenanceservice.exe0.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msdtc.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msiexec.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: PerceptionSimulationService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: perfhost.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: java-rmi.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: java.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javacpl.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javaw.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: javaws.exe0.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: jjs.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: jp2launcher.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: keytool.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: kinit.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: klist.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: DiagnosticsHub.StandardCollector.Service.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Locator.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: MsSense.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: SensorDataService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: snmptrap.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: Spectrum.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ssh-agent.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: TieringEngineService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: AgentService.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: vds.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: VSSVC.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ktab.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: orbd.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: pack200.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: policytool.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: rmid.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: rmiregistry.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: servertool.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ssvagent.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: tnameserv.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: unpack200.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: wbengine.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: WmiApSrv.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: wmpnetwk.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: SearchIndexer.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: 7z.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: 7zFM.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: ie_to_edge_stub.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: cookie_exporter.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: identity_helper.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: setup.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msedgewebview2.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Source: msedge_proxy.exe.1.dr | Static PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |