Click to jump to signature section
Source: | Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Transfer.exe, 00000003.00000002.577025828.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000003.00000000.325846732.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000004.00000002.440480411.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000004.00000000.398793827.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe.1.dr |
Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr |
Source: C:\Windows\System32\msiexec.exe | File opened: z: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: x: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: v: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: t: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: r: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: p: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: n: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: l: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: j: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: h: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: f: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: b: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: y: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: w: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: u: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: s: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: q: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: o: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: m: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: k: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: i: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: g: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: e: | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: c: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: a: | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows | Jump to behavior |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: Transfer.exe.1.dr | String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ocsp.thawte.com0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s.symcb.com/universal-root.crl0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s.symcd.com06 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s1.symcb.com/pca3-g5.crl0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://s2.symcb.com0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://sv.symcb.com/sv.crl0a |
Source: Transfer.exe.1.dr | String found in binary or memory: http://sv.symcb.com/sv.crt0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://sv.symcd.com0& |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://t2.symcb.com0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crl0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crt0 |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: http://tl.symcd.com0& |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0( |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-ocsp.ws.symantec.com07 |
Source: Transfer.exe.1.dr | String found in binary or memory: http://ts-ocsp.ws.symantec.com0; |
Source: Transfer.exe, 00000003.00000002.577353515.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Transfer.exe, 00000003.00000002.577640433.0000000069881000.00000020.00000001.01000000.00000004.sdmp, Transfer.exe, 00000004.00000002.440566834.0000000069881000.00000020.00000001.01000000.00000004.sdmp, Transfer.exe, 00000004.00000003.432756248.0000000002750000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.indyproject.org/ |
Source: Transfer.exe.1.dr | String found in binary or memory: http://www.nero.com |
Source: Transfer.exe.1.dr | String found in binary or memory: http://www.symauth.com/cps0( |
Source: Transfer.exe.1.dr | String found in binary or memory: http://www.symauth.com/rpa00 |
Source: Transfer.exe.1.dr | String found in binary or memory: https://d.symcb.com/cps0% |
Source: Transfer.exe.1.dr | String found in binary or memory: https://d.symcb.com/rpa0 |
Source: Transfer.exe.1.dr | String found in binary or memory: https://d.symcb.com/rpa0. |
Source: Transfer.exe, 00000003.00000002.577640433.0000000069881000.00000020.00000001.01000000.00000004.sdmp, Transfer.exe, 00000004.00000002.440566834.0000000069881000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: https://feliz2023.correio.biz/pipoca/postUP.php |
Source: Transfer.exe, 00000003.00000002.577640433.0000000069881000.00000020.00000001.01000000.00000004.sdmp, Transfer.exe, 00000004.00000002.440566834.0000000069881000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: https://rentry.co/e6oicv/raw |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: https://www.advancedinstaller.com |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: https://www.thawte.com/cps0/ |
Source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr | String found in binary or memory: https://www.thawte.com/repository0W |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: tsappcmp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: tsappcmp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Section loaded: security.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Section loaded: libeay32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Section loaded: security.dll | Jump to behavior |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\NFeNFCe.msi" | |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F976ACED0B98CECA5DED949820F67829 | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\AppData\Roaming\Transfer.exe C:\Users\user\AppData\Roaming\Transfer.exe | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Transfer.exe "C:\Users\user\AppData\Roaming\Transfer.exe" | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F976ACED0B98CECA5DED949820F67829 | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\AppData\Roaming\Transfer.exe C:\Users\user\AppData\Roaming\Transfer.exe | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A41510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep, | 3_2_00A41510 |
Source: | Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Transfer.exe, 00000003.00000002.577025828.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000003.00000000.325846732.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000004.00000002.440480411.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe, 00000004.00000000.398793827.0000000000A4F000.00000002.00000001.01000000.00000003.sdmp, Transfer.exe.1.dr |
Source: | Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: NFeNFCe.msi, 6953fd.msi.1.dr, MSI5D06.tmp.1.dr |
Source: drivespan.dll.1.dr | Static PE information: section name: .didata |
Source: drivespan.dll.1.dr | Static PE information: section name: ."NA |
Source: drivespan.dll.1.dr | Static PE information: section name: .LmE |
Source: drivespan.dll.1.dr | Static PE information: section name: .@#D |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A41000 SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary, | 3_2_00A41000 |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5DC3.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Users\user\AppData\Roaming\Transfer.exe | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5B40.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5E31.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5D06.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Users\user\AppData\Roaming\drivespan.dll | Jump to dropped file |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: F10005 value: E9 FB 99 E5 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 77D69A00 value: E9 0A 66 1A 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: F30007 value: E9 7B 4C E7 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 77DA4C80 value: E9 8E B3 18 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: F40005 value: E9 FB BF DF 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 77D3C000 value: E9 0A 40 20 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: F60008 value: E9 AB E0 E1 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 77D7E0B0 value: E9 60 1F 1E 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: F70005 value: E9 CB 5A 66 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 775D5AD0 value: E9 3A A5 99 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: F80005 value: E9 5B B0 67 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 775FB060 value: E9 AA 4F 98 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: F90005 value: E9 DB F8 B9 73 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 74B2F8E0 value: E9 2A 07 46 8C | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: FA0005 value: E9 FB 42 BB 73 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1900 base: 74B54300 value: E9 0A BD 44 8C | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 710005 value: E9 FB 99 65 77 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 77D69A00 value: E9 0A 66 9A 88 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 720007 value: E9 7B 4C 68 77 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 77DA4C80 value: E9 8E B3 97 88 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 730005 value: E9 FB BF 60 77 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 77D3C000 value: E9 0A 40 9F 88 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 750008 value: E9 AB E0 62 77 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 77D7E0B0 value: E9 60 1F 9D 88 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 760005 value: E9 CB 5A E7 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 775D5AD0 value: E9 3A A5 18 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 770005 value: E9 5B B0 E8 76 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 775FB060 value: E9 AA 4F 17 89 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 980005 value: E9 DB F8 1A 74 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 74B2F8E0 value: E9 2A 07 E5 8B | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 990005 value: E9 FB 42 1C 74 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 74B54300 value: E9 0A BD E3 8B | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 77D3C000 value: 8B FF 55 8B EC | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 775D5AD0 value: 8B FF 55 8B EC | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 775FB060 value: 8B FF 55 8B EC | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 74B2F8E0 value: 8B FF 55 8B EC | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Memory written: PID: 1416 base: 74B54300 value: 8B FF 55 8B EC | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006BCCE849 second address: 000000006BCCE853 instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 clc 0x00000005 shr eax, 0Fh 0x00000008 xor bl, cl 0x0000000a rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006CAAEC45 second address: 000000006BD80A3D instructions: 0x00000000 rdtsc 0x00000002 lahf 0x00000003 push ecx 0x00000004 jmp 00007F2AFFDB27BBh 0x00000009 mov esi, dword ptr [esp+28h] 0x0000000d rcr edi, 08h 0x00000010 ror esi, 03h 0x00000013 rol bx, cl 0x00000016 not esi 0x00000018 cmc 0x00000019 ror esi, 02h 0x0000001c cwde 0x0000001d movsx bx, dh 0x00000021 movsx ebx, ax 0x00000024 inc esi 0x00000025 not dh 0x00000027 ror ebp, FFFFFFA4h 0x0000002a movzx edi, bx 0x0000002d bswap esi 0x0000002f cmc 0x00000030 rcl bl, cl 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006CB5016A second address: 000000006CB5017C instructions: 0x00000000 rdtsc 0x00000002 cmovnle edx, eax 0x00000005 pushfd 0x00000006 sbb eax, 5BFA255Bh 0x0000000b push ebx 0x0000000c add si, 3567h 0x00000011 stc 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006BDC1814 second address: 000000006BDC1818 instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 lahf 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006AE1C818 second address: 0000000069FDD39A instructions: 0x00000000 rdtsc 0x00000002 lahf 0x00000003 push ecx 0x00000004 jmp 00007F2AFFBB3F85h 0x00000009 mov esi, dword ptr [esp+28h] 0x0000000d rcr edi, 08h 0x00000010 ror esi, 03h 0x00000013 rol bx, cl 0x00000016 not esi 0x00000018 cmc 0x00000019 ror esi, 02h 0x0000001c cwde 0x0000001d movsx bx, dh 0x00000021 movsx ebx, ax 0x00000024 inc esi 0x00000025 not dh 0x00000027 ror ebp, FFFFFFA4h 0x0000002a movzx edi, bx 0x0000002d bswap esi 0x0000002f cmc 0x00000030 rcl bl, cl 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006B6FF680 second address: 000000006B6FF68A instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 clc 0x00000005 shr eax, 0Fh 0x00000008 xor bl, cl 0x0000000a rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006AAA5C0F second address: 000000006AAA5C21 instructions: 0x00000000 rdtsc 0x00000002 cmovnle edx, eax 0x00000005 pushfd 0x00000006 sbb eax, 5BFA255Bh 0x0000000b push ebx 0x0000000c add si, 3567h 0x00000011 stc 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006A0A23C2 second address: 000000006B554797 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 cmp ah, FFFFFFEEh 0x00000006 lea edi, dword ptr [edi-00000008h] 0x0000000c clc 0x0000000d cmc 0x0000000e cmp di, 1EC7h 0x00000013 mov dword ptr [edi], edx 0x00000015 ror dl, FFFFFFEDh 0x00000018 rol dh, FFFFFFBBh 0x0000001b mov dword ptr [edi+04h], eax 0x0000001e adc dl, 0000003Fh 0x00000021 bswap dx 0x00000024 mov edx, dword ptr [ebp+00h] 0x00000028 cmp esi, 174417F7h 0x0000002e jmp 00007F2B0214C702h 0x00000033 lea ebp, dword ptr [ebp+00000004h] 0x00000039 stc 0x0000003a test si, dx 0x0000003d cmc 0x0000003e xor edx, ebx 0x00000040 test edi, 30BD7C4Eh 0x00000046 cmp ah, FFFFFFAFh 0x00000049 neg edx 0x0000004b inc edx 0x0000004c ror edx, 02h 0x0000004f stc 0x00000050 cmp ah, bh 0x00000052 add edx, 2FC63096h 0x00000058 test al, 7Ch 0x0000005a test si, si 0x0000005d xor ebx, edx 0x0000005f test dl, 00000005h 0x00000062 cmc 0x00000063 add esi, edx 0x00000065 jmp 00007F2AFF9B42D5h 0x0000006a jmp 00007F2B012BB8BFh 0x0000006f lea edx, dword ptr [esp+60h] 0x00000073 clc 0x00000074 test sp, 3D1Ch 0x00000079 cmp edi, edx 0x0000007b ja 00007F2AFFB96365h 0x00000081 jmp esi 0x00000083 mov ecx, dword ptr [edi] 0x00000085 inc edx 0x00000086 movzx eax, sp 0x00000089 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 0000000069EC2481 second address: 000000006AAA5C0F instructions: 0x00000000 rdtsc 0x00000002 movzx ax, cl 0x00000006 pop ebp 0x00000007 jmp 00007F2B00BCAB01h 0x0000000c pop ebx 0x0000000d movsx eax, ax 0x00000010 pop esi 0x00000011 cmovne edi, esp 0x00000014 cwde 0x00000015 pop edi 0x00000016 xchg ah, cl 0x00000018 pop ecx 0x00000019 setnb dl 0x0000001c lahf 0x0000001d pop edx 0x0000001e jmp 00007F2B00840F1Bh 0x00000023 pop eax 0x00000024 jmp 00007F2B0039C432h 0x00000029 ret 0x0000002a call 00007F2B0082FE95h 0x0000002f push ebp 0x00000030 pushfd 0x00000031 mov ebp, 33616804h 0x00000036 mov dword ptr [esp+08h], 66DA69C3h 0x0000003e mov ebp, dword ptr [esp+ebp*2-66C2D004h] 0x00000045 call 00007F2B0199AAC8h 0x0000004a add dword ptr [esp+00h], 0073CC21h 0x00000052 ret 0x00000053 push dword ptr [esp+00h] 0x00000057 popfd 0x00000058 lea esp, dword ptr [esp+08h] 0x0000005c call 00007F2B001A5B47h 0x00000061 push ebp 0x00000062 jmp 00007F2B00E43E0Dh 0x00000067 push edx 0x00000068 xchg dx, dx 0x0000006b push edi 0x0000006c bswap di 0x0000006f push eax 0x00000070 cbw 0x00000072 push esi 0x00000073 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006CAAEC45 second address: 000000006BD80A3D instructions: 0x00000000 rdtsc 0x00000002 lahf 0x00000003 push ecx 0x00000004 jmp 00007F2AFFCC51FBh 0x00000009 mov esi, dword ptr [esp+28h] 0x0000000d rcr edi, 08h 0x00000010 ror esi, 03h 0x00000013 rol bx, cl 0x00000016 not esi 0x00000018 cmc 0x00000019 ror esi, 02h 0x0000001c cwde 0x0000001d movsx bx, dh 0x00000021 movsx ebx, ax 0x00000024 inc esi 0x00000025 not dh 0x00000027 ror ebp, FFFFFFA4h 0x0000002a movzx edi, bx 0x0000002d bswap esi 0x0000002f cmc 0x00000030 rcl bl, cl 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006AE1C818 second address: 0000000069FDD39A instructions: 0x00000000 rdtsc 0x00000002 lahf 0x00000003 push ecx 0x00000004 jmp 00007F2AFFCA1545h 0x00000009 mov esi, dword ptr [esp+28h] 0x0000000d rcr edi, 08h 0x00000010 ror esi, 03h 0x00000013 rol bx, cl 0x00000016 not esi 0x00000018 cmc 0x00000019 ror esi, 02h 0x0000001c cwde 0x0000001d movsx bx, dh 0x00000021 movsx ebx, ax 0x00000024 inc esi 0x00000025 not dh 0x00000027 ror ebp, FFFFFFA4h 0x0000002a movzx edi, bx 0x0000002d bswap esi 0x0000002f cmc 0x00000030 rcl bl, cl 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | RDTSC instruction interceptor: First address: 000000006A0A23C2 second address: 000000006B554797 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 cmp ah, FFFFFFEEh 0x00000006 lea edi, dword ptr [edi-00000008h] 0x0000000c clc 0x0000000d cmc 0x0000000e cmp di, 1EC7h 0x00000013 mov dword ptr [edi], edx 0x00000015 ror dl, FFFFFFEDh 0x00000018 rol dh, FFFFFFBBh 0x0000001b mov dword ptr [edi+04h], eax 0x0000001e adc dl, 0000003Fh 0x00000021 bswap dx 0x00000024 mov edx, dword ptr [ebp+00h] 0x00000028 cmp esi, 174417F7h 0x0000002e jmp 00007F2B0205F142h 0x00000033 lea ebp, dword ptr [ebp+00000004h] 0x00000039 stc 0x0000003a test si, dx 0x0000003d cmc 0x0000003e xor edx, ebx 0x00000040 test edi, 30BD7C4Eh 0x00000046 cmp ah, FFFFFFAFh 0x00000049 neg edx 0x0000004b inc edx 0x0000004c ror edx, 02h 0x0000004f stc 0x00000050 cmp ah, bh 0x00000052 add edx, 2FC63096h 0x00000058 test al, 7Ch 0x0000005a test si, si 0x0000005d xor ebx, edx 0x0000005f test dl, 00000005h 0x00000062 cmc 0x00000063 add esi, edx 0x00000065 jmp 00007F2AFF8C6D15h 0x0000006a jmp 00007F2B011CE2FFh 0x0000006f lea edx, dword ptr [esp+60h] 0x00000073 clc 0x00000074 test sp, 3D1Ch 0x00000079 cmp edi, edx 0x0000007b ja 00007F2AFFAA8DA5h 0x00000081 jmp esi 0x00000083 mov ecx, dword ptr [edi] 0x00000085 inc edx 0x00000086 movzx eax, sp 0x00000089 rdtsc |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A41510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep, | 3_2_00A41510 |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A41510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep, | 3_2_00A41510 |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A41000 SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary, | 3_2_00A41000 |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A42F17 SetUnhandledExceptionFilter, | 3_2_00A42F17 |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A42821 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_00A42821 |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A42DC9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00A42DC9 |
Source: C:\Users\user\AppData\Roaming\Transfer.exe | Code function: 3_2_00A455D7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00A455D7 |
Source: Transfer.exe, 00000003.00000002.577353515.000000000302F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGER1 |
Source: Transfer.exe, 00000003.00000002.577353515.0000000002F68000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Managerperience Host\Transfer.exe |
Source: Transfer.exe, 00000003.00000002.577353515.000000000302F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Manager |
Source: Transfer.exe, 00000003.00000002.577353515.000000000302F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGER@ |
Source: Transfer.exe, 00000003.00000002.577353515.000000000302F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGER |