Click to jump to signature section
Source: C:\Windows\System32\msiexec.exe | File opened: z: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: x: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: v: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: t: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: r: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: p: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: n: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: l: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: j: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: h: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: f: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: b: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: y: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: w: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: u: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: s: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: q: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: o: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: m: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: k: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: i: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: g: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: e: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: c: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: a: | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push eax | 3_2_0240CB88 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then test edx, edx | 3_2_02403A62 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then add edi, 08h | 3_2_02403A62 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push dword ptr [ebp+0Ch] | 3_2_02403A62 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov ecx, 0000003Ch | 3_2_0240AA72 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then lea eax, dword ptr [ebp-64h] | 3_2_0240AA72 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov ecx, 00000005h | 3_2_0240AA72 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp eax, 7Ah | 3_2_02406E7B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then sub eax, 20h | 3_2_02406E7B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp eax, 7Ah | 3_2_02406E7B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then sub eax, 20h | 3_2_02406E7B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 023FFF17h | 3_2_023FFE78 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp al, 7Ah | 3_2_0240F63F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then sub al, 20h | 3_2_0240F63F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 0240B8DDh | 3_2_0240B6C6 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 0240B93Ah | 3_2_0240B6C6 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp eax, 000000C6h | 3_2_0240D2F6 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp word ptr [edi+eax*2-02h], 005Ch | 3_2_0240D2F6 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then inc dword ptr [ebp-04h] | 3_2_0240AEAA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov ecx, 00000005h | 3_2_0240AB7F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov ebx, dword ptr [edx+00000334h] | 3_2_0240F820 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 023FFD11h | 3_2_023FFC5E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 0240FD3Ah | 3_2_0240FD17 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then call 6C72CF20h | 3_2_6C72CF0E |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: abd1 .exe, 00000003.00000002.564671753.000000000075F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: abd1 .exe, 00000003.00000000.304487946.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: abd1 .exe, 00000003.00000000.304487946.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://stats.itopvpn.com/iusage.php |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0 |
Source: abd1 .exe, abd1 .exe, 00000004.00000002.389273322.000000006A9FA000.00000040.00000001.01000000.00000004.sdmp, abd1 .exe, 00000004.00000002.387432573.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, abd1 .exe, 00000005.00000002.412714315.0000000002450000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.indyproject.org/ |
Source: abd1 .exe, 00000003.00000002.564671753.0000000000714000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/ |
Source: abd1 .exe, abd1 .exe, 00000004.00000002.385627041.0000000000196000.00000004.00000010.00020000.00000000.sdmp, abd1 .exe, 00000004.00000002.389273322.000000006A60E000.00000040.00000001.01000000.00000004.sdmp, abd1 .exe, 00000005.00000002.404441078.0000000000196000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php |
Source: abd1 .exe, 00000003.00000002.564671753.0000000000734000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.564671753.00000000006E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php... |
Source: abd1 .exe, 00000003.00000002.573663174.0000000006240000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php2 |
Source: abd1 .exe, 00000003.00000002.564671753.000000000075F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php5 |
Source: abd1 .exe, 00000003.00000002.573663174.0000000006240000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php: |
Source: abd1 .exe, 00000003.00000002.573663174.0000000006240000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php; |
Source: abd1 .exe, 00000003.00000002.564671753.00000000006E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpH0 |
Source: abd1 .exe, 00000003.00000002.564671753.00000000006E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpHistory.IE5 |
Source: abd1 .exe, 00000003.00000002.573663174.0000000006240000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpX |
Source: abd1 .exe, 00000003.00000002.564671753.0000000000734000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phph |
Source: abd1 .exe, 00000003.00000002.564671753.00000000006E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phphe |
Source: abd1 .exe, 00000003.00000002.564671753.000000000075F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpheC: |
Source: abd1 .exe, 00000003.00000002.564671753.0000000000734000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phps/bo/inspecionando.phpo.php8 |
Source: abd1 .exe, 00000004.00000002.385627041.0000000000196000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpt |
Source: abd1 .exe, 00000004.00000002.385627041.0000000000196000.00000004.00000010.00020000.00000000.sdmp, abd1 .exe, 00000005.00000002.404441078.0000000000196000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phputllib.dll.DLL |
Source: abd1 .exe, 00000003.00000002.564671753.000000000071A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: abd1 .exe.1.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: 00000004.00000002.386779049.00000000022F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 00000003.00000002.577793430.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 Author: unknown |
Source: 00000003.00000002.577793430.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 00000003.00000002.570577629.00000000023A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 00000005.00000002.408834670.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 00000004.00000002.419723352.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 Author: unknown |
Source: 00000004.00000002.419723352.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 00000005.00000002.419737912.000000006C72A000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 Author: unknown |
Source: 00000005.00000002.419737912.000000006C72A000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 00000005.00000002.419737912.000000006C72A000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_d4b38e13 Author: unknown |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: 00000004.00000002.386779049.00000000022F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 00000003.00000002.577793430.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 reference_sample = 650bf19e73ac2d9ebbf62f15eeb603c2b4a6a65432c70b87edc429165d6706f3, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Generic, fingerprint = 06eca9064ca27784b61994844850f05c47c07ba6c4242a2572d6d0c484a920f0, id = a160ca52-8911-4649-a1fa-ac8f6f75e18d, last_modified = 2022-04-12 |
Source: 00000003.00000002.577793430.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 00000003.00000002.570577629.00000000023A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 00000005.00000002.408834670.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 00000004.00000002.419723352.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 reference_sample = 650bf19e73ac2d9ebbf62f15eeb603c2b4a6a65432c70b87edc429165d6706f3, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Generic, fingerprint = 06eca9064ca27784b61994844850f05c47c07ba6c4242a2572d6d0c484a920f0, id = a160ca52-8911-4649-a1fa-ac8f6f75e18d, last_modified = 2022-04-12 |
Source: 00000004.00000002.419723352.000000006C72B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 00000005.00000002.419737912.000000006C72A000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 reference_sample = 650bf19e73ac2d9ebbf62f15eeb603c2b4a6a65432c70b87edc429165d6706f3, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Generic, fingerprint = 06eca9064ca27784b61994844850f05c47c07ba6c4242a2572d6d0c484a920f0, id = a160ca52-8911-4649-a1fa-ac8f6f75e18d, last_modified = 2022-04-12 |
Source: 00000005.00000002.419737912.000000006C72A000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 00000005.00000002.419737912.000000006C72A000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_d4b38e13 reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = c91f97a7e609d8138f8c5c7dd66cf675b1b3762f26baa5bf983ee212011b99cb, id = d4b38e13-1439-4549-ba90-0b4a8ed57fb3, last_modified = 2022-04-12 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02409E38 | 3_2_02409E38 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02409EBB | 3_2_02409EBB |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0240A041 | 3_2_0240A041 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A206E | 3_2_023A206E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A484F | 3_2_023A484F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_2_6A5FD780 | 4_2_6A5FD780 |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\n_f_3_f_1_s_k_4_l.msi" | |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B175E679D861DA44C1D62490FCC9BB11 | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\AppData\Roaming\abd1 .exe C:\Users\user\AppData\Roaming\abd1 .exe | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\abd1 .exe "C:\Users\user\AppData\Roaming\abd1 .exe" | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\abd1 .exe "C:\Users\user\AppData\Roaming\abd1 .exe" | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B175E679D861DA44C1D62490FCC9BB11 | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\AppData\Roaming\abd1 .exe C:\Users\user\AppData\Roaming\abd1 .exe | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Mutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$638 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Mutant created: \Sessions\1\BaseNamedObjects\gg24UGs6BG |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Mutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$19a4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Mutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$50c |
Source: abd1 .exe | String found in binary or memory: ISO_6937-2-add |
Source: abd1 .exe | String found in binary or memory: NATS-SEFI-ADD |
Source: abd1 .exe | String found in binary or memory: NATS-DANO-ADD |
Source: abd1 .exe | String found in binary or memory: jp-ocr-b-add |
Source: abd1 .exe | String found in binary or memory: jp-ocr-hand-add |
Source: abd1 .exe | String found in binary or memory: JIS_C6229-1984-hand-add |
Source: abd1 .exe | String found in binary or memory: JIS_C6229-1984-b-add |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02452E4A pushfd ; iretd | 3_3_02452E4E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02450869 push ebx; retf | 3_3_0245086D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_0245360A pushfd ; iretd | 3_3_02453626 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_024518D6 push edi; iretd | 3_3_02451925 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02452CE6 pushfd ; iretd | 3_3_02452CEA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02455AF3 push esp; ret | 3_3_02455B04 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02452745 push eax; retf | 3_3_02452752 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02451B13 push eax; ret | 3_3_02451B14 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02450193 push cs; retf | 3_3_02450196 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A52FF push edx; ret | 3_2_023A5306 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A5EF1 push ebx; retf | 3_2_023A5EF2 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A6385 push ebx; iretd | 3_2_023A6398 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A6033 push ebx; iretd | 3_2_023A6034 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A1C15 push eax; retf | 3_2_023A1C22 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A4929 push edx; retf | 3_2_023A492E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A5991 push esp; iretd | 3_2_023A5996 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_023A05EB push cs; retf | 3_2_023A05EE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_6C72CD29 push 00000048h; ret | 3_2_6C72CD2B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_6C722008 pushad ; retf | 3_2_6C722009 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_3_02626662 push cs; retf | 4_3_02626663 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_3_0262496A pushad ; retf | 4_3_0262496B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_3_02624D79 push edx; ret | 4_3_02624D7C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_3_02623D09 push edx; ret | 4_3_02623D0C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_3_02627DB6 push ebp; ret | 4_3_02627DDA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_3_02624D85 push cs; ret | 4_3_02624D87 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_2_6A618204 push ecx; mov dword ptr [esp], ecx | 4_2_6A618208 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_2_6A6422F0 push ecx; mov dword ptr [esp], edx | 4_2_6A6422F1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_2_6A6D33EC push ecx; mov dword ptr [esp], ecx | 4_2_6A6D33F1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_2_6A604788 push ecx; mov dword ptr [esp], edx | 4_2_6A604789 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_2_6A62D794 push ecx; mov dword ptr [esp], edx | 4_2_6A62D796 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4_2_6A6D4424 push ecx; mov dword ptr [esp], ecx | 4_2_6A6D4428 |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: WebUI.dll.1.dr | Static PE information: section name: |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5AE8.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Users\user\AppData\Roaming\abd1 .exe | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5D0F.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Users\user\AppData\Roaming\WebUI.dll | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5C51.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5C81.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI5C12.tmp | Jump to dropped file |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1592 base: 4A3E60 value: E9 FB 65 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1592 base: 4A397C value: E9 FB 68 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1592 base: 49FCC0 value: E9 0B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1592 base: 49FCE4 value: E9 6B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1592 base: 49FCF4 value: E9 FF E8 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1592 base: 49FCB0 value: E9 B7 EA 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 6564 base: 4A3E60 value: E9 FB 65 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 6564 base: 4A397C value: E9 FB 68 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 6564 base: 49FCC0 value: E9 0B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 6564 base: 49FCE4 value: E9 6B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 6564 base: 49FCF4 value: E9 FF E8 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 6564 base: 49FCB0 value: E9 B7 EA 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1292 base: 4A3E60 value: E9 FB 65 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1292 base: 4A397C value: E9 FB 68 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1292 base: 49FCC0 value: E9 0B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1292 base: 49FCE4 value: E9 6B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1292 base: 49FCF4 value: E9 FF E8 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 1292 base: 49FCB0 value: E9 B7 EA 06 00 | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: abd1 .exe, 00000003.00000002.564671753.000000000071A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWx`Y~ |
Source: abd1 .exe, 00000003.00000002.564671753.0000000000734000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.564671753.00000000006E1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugFlags | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugFlags | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugFlags | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process queried: DebugPort | Jump to behavior |
Source: abd1 .exe, 00000003.00000000.304487946.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | Binary or memory string: ProgmanU |
Source: abd1 .exe, 00000003.00000002.571181544.0000000002548000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Manager@ |