Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: Fct63e39.msi, MSI8499.tmp.1.dr |
Source: | Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Transfer.exe, 00000003.00000000.325975738.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000003.00000002.580956216.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000006.00000000.433088912.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000006.00000002.508314347.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe.1.dr |
Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbl source: Fct63e39.msi, MSI8499.tmp.1.dr |
Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Fct63e39.msi, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr |
Source: C:\Windows\System32\msiexec.exe | File opened: z: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: x: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: v: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: t: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: r: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: p: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: n: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: l: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: j: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: h: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: f: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: b: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: y: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: w: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: u: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: s: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: q: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: o: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: m: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: k: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: i: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: g: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: e: | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | File opened: c: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: a: | Jump to behavior |
Source: Transfer.exe, 00000003.00000002.581528162.00000000698A1000.00000020.00000001.01000000.00000004.sdmp, Transfer.exe, 00000006.00000002.508629839.00000000698A1000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: http://81.161.229.121/005/postUP.php |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: Transfer.exe.1.dr | String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ocsp.thawte.com0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s.symcb.com/universal-root.crl0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s.symcd.com06 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s1.symcb.com/pca3-g5.crl0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s2.symcb.com0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://sv.symcb.com/sv.crl0a |
Source: Transfer.exe.1.dr | String found in binary or memory: http://sv.symcb.com/sv.crt0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://sv.symcd.com0& |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://t2.symcb.com0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crl0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crt0 |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: http://tl.symcd.com0& |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0( |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-ocsp.ws.symantec.com07 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-ocsp.ws.symantec.com0; |
Source: Transfer.exe, 00000003.00000002.581196742.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, Transfer.exe, 00000003.00000002.581528162.00000000698A1000.00000020.00000001.01000000.00000004.sdmp, Transfer.exe, 00000006.00000003.507173820.0000000003280000.00000004.00001000.00020000.00000000.sdmp, Transfer.exe, 00000006.00000002.508629839.00000000698A1000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: http://www.indyproject.org/ |
Source: Transfer.exe.1.dr | String found in binary or memory: http://www.nero.com |
Source: Transfer.exe.1.dr | String found in binary or memory: http://www.symauth.com/cps0( |
Source: Transfer.exe.1.dr | String found in binary or memory: http://www.symauth.com/rpa00 |
Source: Transfer.exe.1.dr | String found in binary or memory: https://d.symcb.com/cps0% |
Source: Transfer.exe.1.dr | String found in binary or memory: https://d.symcb.com/rpa0 |
Source: Transfer.exe.1.dr | String found in binary or memory: https://d.symcb.com/rpa0. |
Source: Transfer.exe, 00000003.00000002.581528162.00000000698A1000.00000020.00000001.01000000.00000004.sdmp, Transfer.exe, 00000006.00000002.508629839.00000000698A1000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: https://rentry.co/e6oicv/raw |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: https://www.advancedinstaller.com |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: https://www.thawte.com/cps0/ |
Source: Fct63e39.msi, MSI8499.tmp.1.dr, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr | String found in binary or memory: https://www.thawte.com/repository0W |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Fct63e39.msi" | |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F98DBCD8EB795A8D118A247529EBDDF4 | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\Pictures\Transfer.exe C:\Users\user\Pictures\Transfer.exe | |
Source: unknown | Process created: C:\Users\user\Pictures\Transfer.exe "C:\Users\user\Pictures\Transfer.exe" | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F98DBCD8EB795A8D118A247529EBDDF4 | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\Pictures\Transfer.exe C:\Users\user\Pictures\Transfer.exe | Jump to behavior |
Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: Fct63e39.msi, MSI8499.tmp.1.dr |
Source: | Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Transfer.exe, 00000003.00000000.325975738.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000003.00000002.580956216.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000006.00000000.433088912.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000006.00000002.508314347.000000000088F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe.1.dr |
Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbl source: Fct63e39.msi, MSI8499.tmp.1.dr |
Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Fct63e39.msi, MSI842B.tmp.1.dr, MSI8556.tmp.1.dr, MSI8235.tmp.1.dr |
Source: C:\Users\user\Pictures\Transfer.exe | Code function: 3_2_00881000 SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary, | 3_2_00881000 |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 9B0005 value: E9 FB 99 3B 77 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 77D69A00 value: E9 0A 66 C4 88 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 9C0007 value: E9 7B 4C 3E 77 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 77DA4C80 value: E9 8E B3 C1 88 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 9E0005 value: E9 FB BF 35 77 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 77D3C000 value: E9 0A 40 CA 88 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: A00008 value: E9 AB E0 37 77 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 77D7E0B0 value: E9 60 1F C8 88 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: A10005 value: E9 CB 5A BC 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 775D5AD0 value: E9 3A A5 43 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: A20005 value: E9 5B B0 BD 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 775FB060 value: E9 AA 4F 42 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: A30005 value: E9 DB F8 0F 74 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 74B2F8E0 value: E9 2A 07 F0 8B | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: A40005 value: E9 FB 42 11 74 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 2264 base: 74B54300 value: E9 0A BD EE 8B | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1310005 value: E9 FB 99 A5 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 77D69A00 value: E9 0A 66 5A 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1320007 value: E9 7B 4C A8 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 77DA4C80 value: E9 8E B3 57 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1530005 value: E9 FB BF 80 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 77D3C000 value: E9 0A 40 7F 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1550008 value: E9 AB E0 82 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 77D7E0B0 value: E9 60 1F 7D 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1560005 value: E9 CB 5A 07 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 775D5AD0 value: E9 3A A5 F8 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1570005 value: E9 5B B0 08 76 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 775FB060 value: E9 AA 4F F7 89 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1580005 value: E9 DB F8 5A 73 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 74B2F8E0 value: E9 2A 07 A5 8C | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 1590005 value: E9 FB 42 5C 73 | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Memory written: PID: 492 base: 74B54300 value: E9 0A BD A3 8C | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | RDTSC instruction interceptor: First address: 000000006BBECA40 second address: 000000006BD05C1E instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 push edi 0x00000004 pushfd 0x00000005 mov edi, 5C400C28h 0x0000000a add di, di 0x0000000d jnc 00007F7FC4B517C3h 0x00000013 mov edi, dword ptr [esp+edi-5C40184Ch] 0x0000001a mov dword ptr [esp+04h], F5E981D1h 0x00000022 push dword ptr [esp+00h] 0x00000026 popfd 0x00000027 lea esp, dword ptr [esp+04h] 0x0000002b call 00007F7FC4F03B11h 0x00000030 push ebp 0x00000031 push edx 0x00000032 cwd 0x00000034 movzx edx, cx 0x00000037 push ecx 0x00000038 mov bp, bp 0x0000003b pushfd 0x0000003c push esi 0x0000003d sal bp, 0037h 0x00000041 sar edx, cl 0x00000043 push ebx 0x00000044 setl bh 0x00000047 btc si, 0005h 0x0000004c movsx ebp, si 0x0000004f push edi 0x00000050 shr bl, FFFFFFD8h 0x00000053 push eax 0x00000054 lahf 0x00000055 rdtsc |
Source: C:\Users\user\Pictures\Transfer.exe | RDTSC instruction interceptor: First address: 000000006BB78059 second address: 000000006BB7806F instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 inc eax 0x00000004 rcl bh, cl 0x00000006 dec ecx 0x00000007 adc ebp, 107B1508h 0x0000000d inc bh 0x0000000f inc ecx 0x00000010 pop ebp 0x00000011 lahf 0x00000012 inc ecx 0x00000013 mov dl, EBh 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Pictures\Transfer.exe | RDTSC instruction interceptor: First address: 000000006ABE1561 second address: 000000006A700EAE instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [69BDBFC0h] 0x00000007 mov edx, dword ptr [eax] 0x00000009 test edx, edx 0x0000000b jmp 00007F7FC54E5264h 0x00000010 je 00007F7FC4970318h 0x00000016 mov ecx, dword ptr [ebp+08h] 0x00000019 jmp 00007F7FC4FF475Bh 0x0000001e call 00007F7FC317A4DAh 0x00000023 call 00007F7FC5C781F2h 0x00000028 call 00007F7FC4BE5907h 0x0000002d push ebp 0x0000002e call 00007F7FC552172Dh 0x00000033 mov ebp, 725B3A32h 0x00000038 mov dword ptr [esp+0Ch], 5A151E15h 0x00000040 mov ebp, dword ptr [esp+ebp-725B3A2Eh] 0x00000047 call 00007F7FC4EBD979h 0x0000004c lea esp, dword ptr [esp+10h] 0x00000050 call 00007F7FC3D7F3DCh 0x00000055 push edi 0x00000056 movzx edi, sp 0x00000059 cmovnp di, di 0x0000005d push eax 0x0000005e cbw 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Pictures\Transfer.exe | RDTSC instruction interceptor: First address: 000000006BBECA40 second address: 000000006BD05C1E instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 push edi 0x00000004 pushfd 0x00000005 mov edi, 5C400C28h 0x0000000a add di, di 0x0000000d jnc 00007F7FC4958BA3h 0x00000013 mov edi, dword ptr [esp+edi-5C40184Ch] 0x0000001a mov dword ptr [esp+04h], F5E981D1h 0x00000022 push dword ptr [esp+00h] 0x00000026 popfd 0x00000027 lea esp, dword ptr [esp+04h] 0x0000002b call 00007F7FC4D0AEF1h 0x00000030 push ebp 0x00000031 push edx 0x00000032 cwd 0x00000034 movzx edx, cx 0x00000037 push ecx 0x00000038 mov bp, bp 0x0000003b pushfd 0x0000003c push esi 0x0000003d sal bp, 0037h 0x00000041 sar edx, cl 0x00000043 push ebx 0x00000044 setl bh 0x00000047 btc si, 0005h 0x0000004c movsx ebp, si 0x0000004f push edi 0x00000050 shr bl, FFFFFFD8h 0x00000053 push eax 0x00000054 lahf 0x00000055 rdtsc |
Source: C:\Users\user\Pictures\Transfer.exe | RDTSC instruction interceptor: First address: 000000006ABE1561 second address: 000000006A700EAE instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [69BDBFC0h] 0x00000007 mov edx, dword ptr [eax] 0x00000009 test edx, edx 0x0000000b jmp 00007F7FC52EC644h 0x00000010 je 00007F7FC47776F8h 0x00000016 mov ecx, dword ptr [ebp+08h] 0x00000019 jmp 00007F7FC4DFBB3Bh 0x0000001e call 00007F7FC2F818BAh 0x00000023 call 00007F7FC5A7F5D2h 0x00000028 call 00007F7FC49ECCE7h 0x0000002d push ebp 0x0000002e call 00007F7FC5328B0Dh 0x00000033 mov ebp, 725B3A32h 0x00000038 mov dword ptr [esp+0Ch], 5A151E15h 0x00000040 mov ebp, dword ptr [esp+ebp-725B3A2Eh] 0x00000047 call 00007F7FC4CC4D59h 0x0000004c lea esp, dword ptr [esp+10h] 0x00000050 call 00007F7FC3B867BCh 0x00000055 push edi 0x00000056 movzx edi, sp 0x00000059 cmovnp di, di 0x0000005d push eax 0x0000005e cbw 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: Transfer.exe, 00000003.00000002.581036778.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\7 |
Source: MSI8499.tmp.1.dr | Binary or memory string: HKEY_USERSRegOpenKeyTransactedW::NetUserGetInfo() failed with error: \@invalid string_view positionVMware, Inc.VMware Virtual PlatformVMware7,1innotek GmbHVirtualBoxMicrosoft CorporationVirtual MachineVRTUALACRSYSA M IGetting system informationManufacturer [Model [BIOS [\\?\UNC\\\?\shim_clone%d.%d.%d.%dDllGetVersion[%!]%!ProgramFilesFolderCommonFilesFolderDesktopFolderAllUsersDesktopFolderAppDataFolderFavoritesFolderStartMenuFolderProgramMenuFolderStartupFolderFontsFolderLocalAppDataFolderCommonAppDataFolderProgramFiles64FolderProgramFilesProgramW6432SystemFolderSystem32FolderWindowsFolderWindowsVolumeTempFolderSETUPEXEDIRshfolder.dllSHGetFolderPathWProgramFilesAPPDATAPROGRAMFILES&+ |
Source: Transfer.exe, 00000003.00000002.581036778.0000000000AB9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.0 |
Source: C:\Users\user\Pictures\Transfer.exe | Code function: 3_2_00881000 SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary, | 3_2_00881000 |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\Pictures\Transfer.exe | Code function: 3_2_00882F17 SetUnhandledExceptionFilter, | 3_2_00882F17 |
Source: C:\Users\user\Pictures\Transfer.exe | Code function: 3_2_00882821 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_00882821 |
Source: C:\Users\user\Pictures\Transfer.exe | Code function: 3_2_00882DC9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00882DC9 |
Source: C:\Users\user\Pictures\Transfer.exe | Code function: 3_2_008855D7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_008855D7 |
Source: Transfer.exe, 00000003.00000002.581196742.0000000002A5F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGER@ |
Source: Transfer.exe, 00000003.00000002.581196742.0000000002998000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Managerperience Host\Microsoft\Windows\Start Menu\Programs\Startup\Transfer.exe.lnkrm-urlencoded |
Source: Transfer.exe, 00000003.00000002.581196742.0000000002A5F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program ManagerQ |
Source: Transfer.exe, 00000003.00000002.581196742.0000000002A5F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGER |