Source: | Binary string: \ResBegleiter\obj\x86\Release\Devi.pdbb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\XRoot_Build\XC\Vm\Release\x86\StubExe.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Server.pdb source: cpcs.exe, 00000009.00000003.2535416200.000000000A6BE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \obj\Release\Welp.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \obj\Release\Welp.pdbY{ source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: miniloader-patchdate-stub.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: DarkShell\Server\svchost\Debug\Serverz.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: w:\Project\!lego2new\lego_2011.xx.xx_2.xx\release\NSP.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: se\NSP.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\USERS\DEFAULT\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545034326.000000000E01A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \sw_modem\HSF_HWICH\i386\HSFHWICH.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptnet.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\key\sar\Debug\sar.pdbre source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\dll\mbam.dll\build\mbam.pdb source: cpcsgui.exe, 0000000C.00000002.2571547852.000000006F8B1000.00000002.00000001.01000000.0000000F.sdmp |
Source: | Binary string: Intel Corporationse\NSP.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vpamjon.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NB10??????N????:\??????????\??W????????\????????????????????????????????????????G????\????????????\??????\????????????.pdbj source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: hnetmon.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sass.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\Cryptor\stub6\Release\stub6.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: !lego2new\lego_2011.xx.xx_2.xx\release\NSP.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\UMPk.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\exe\mbampt.exe\build\mbampt.pdb%0A source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004F26000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\WINDOWS\SERVICEPROFILES\NETWORKSERVICE\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545306895.000000000E06C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Release\AvG.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Release\AvG.pdb>M source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: D:\TranceCo.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: E:\WFD\Tools\Server\_Downloader\Share\SFX Package\Pack\obj\x86\Debug\Pack.pdbE source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\USERS\user\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545034326.000000000E01A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fukmp.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NB10??????N????:\??????????\??W????????\????????????????????????????????????????G????\????????????\??????\????????????.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ????????????????.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: aspergillus.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bk22\kloader\Release\i386\kloader.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\Dell\Desktop\SOMA.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fukmp.pdb% source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: p:\vc5\x64\release\resident.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: F:\NTDDK\DEMO\_DarkTest\i386\DarkTest.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\dll\mbam.dll\build\mbam.pdb` source: cpcsgui.exe, 0000000C.00000002.2571547852.000000006F8B1000.00000002.00000001.01000000.0000000F.sdmp |
Source: | Binary string: C:\dev\stuk_rar\release\setup.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\exe\mbamscheduler.exe\build\mbamscheduler.pdb source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004EC9000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\WINDOWS\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545034326.000000000DF4E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\PROGRAM FILES (X86)\FACEHACK\FACEHACK.PDB%vz$ source: cpcs.exe, 00000009.00000003.2546311082.000000000D10C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sfxrar32\Release\sfxrar.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Socksbuilder\stub\release\stub.pdbeb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ent.pdb0?0A source: cpcs.exe, 00000009.00000003.2533784758.000000000A13A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sxtyy.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ?????.pdbr source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: EXTRA=Adware.Agent, %PROGRAMFILES%\Isilo\iSiloDisplaySample.pdb, DP source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: db.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2534960911.000000000A69B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Nuova cartella\myform\myform\obj\Release\myform.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $:\tmp\test.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\??????????????????????????????????????.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: z(1)\stub\Release\stub.pdbtor source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ??:\??????????\??W????????\????????????????????????????????????????G????\????????????\??????\????????????.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: x:\werdon.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\d\objfre_wxp_x86\i386\HG.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: z(1)\stub\Release\stub.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: p:\vc5\x64\release\resident.pdbO6 source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ent.pdb source: cpcs.exe, 00000009.00000003.2533784758.000000000A13A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work_temp\utf8\test2\Release\test2.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e:\job\gh0st1.0\Release\Loader.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: URGABPW.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TDIMUED.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: hnetmon.pdbU source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vpamjon.pdbd9 source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \accs\accs\accs\obj\Release\accs.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: REAPER\Stub\stub rc\obj\Release\stub rc.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: w:\Project\!lego2new\lego_2011.xx.xx_2.xx\release\NSP.pdb/ source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\key\sar\Debug\sar.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ryptnet.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533526590.000000000A5A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Projects\reg\reg\obj\Debug\reg.pdbn source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sxtyy.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WWMWCMGV.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptnet.pdbB source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Projects\reg\reg\obj\Debug\reg.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: HookDllDriver\objfre\i386\hookdll.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NGPCorp\DLL\Release\DLL.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sfxrar32\Release\sfxrar.pdbPY source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Prevazatorul.pdb[ source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\TP\AppData\Local\Temp\zy3gqjbl.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \AccountCreator.pdbk source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: F:\NTDDK\DEMO\_DarkTest\i386\DarkTest.pdbem source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Bacipy.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533630438.000000000A445000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: IEXPLORE\Debug\wibvusd.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: 8$W:\w\Loader.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vCrypt Stub.pdb source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Prevazatorul.pdb source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: &:\UMPk.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ?????.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \ResBegleiter\obj\x86\Release\Devi.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\tmp\test.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ld.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\utf8\test2\Release\test2.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \AccountCreator.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: XC\Vm\Release\x86\StubExe.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Z:\xampp\htdocs\project-727,Permutation\stable\tmp\PDBSIG.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\Fecira.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb)] source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Project1\Project1\obj\Release\Project1.pdb<. source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: W:\w\Loader.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bk22\kloader\Release\i386\kloader.pdbt,n source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\test\test2\Release\test2.pdb< source: cpcs.exe, 00000009.00000003.2529454596.000000000A126000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Projects\War Crypter\Release\Stub.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: D:\SVN Control Code\app_client\Loader\Release\Loader.pdb?_ source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Project1\Project1\obj\Release\Project1.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WWMWCMGV.pdb=; source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ??@RSDS??????????????????????????????????o.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \w.a.t.c.h\w.a.t.c.h\obj\Release\w.a.t.c.h.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e:\job\gh0st1.0\Release\Loader.pdb\ source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545306895.000000000E06C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\XRoot_Build\XC\Vm\Release\x86\StubExe.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\test\test2\Release\test2.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529454596.000000000A126000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \x86\Debug\Balle2.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: E:\WFD\Tools\Server\_Downloader\Share\SFX Package\Pack\obj\x86\Debug\Pack.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Emuhucuqih.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: IEXPLORE\Debug\wibvusd.pdbR source: cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: XC\Vm\Release\x86\StubExe.pdbX source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\test\test2\Release\test2.pdbd source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Tr0gdor\Rxbot 7.6\Debug\rBot.pdbz source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: o.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: note.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\dtcser\sys\i386\killvv.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: EXTRA=Password.Stealer, %TEMP%\Facebook\Facebook Stealer.pdb, DP source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\key\lasass\Debug\lasass.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vCrypt Stub.pdb7 source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: D:\SVN Control Code\app_client\Loader\Release\Loader.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: x:\werdon.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \MyProjects\eMule\Debug\eMule.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\exe\mbampt.exe\build\mbampt.pdb source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004F26000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: Socksbuilder\stub\release\stub.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Tr0gdor\Rxbot 7.6\Debug\rBot.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cm_acl.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\dtcser\sys\i386\killvv.pdb+ source: cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Double Onesass.pdbx7 source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: cpcs.exe, 00000009.00000003.2546029145.000000000D31E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: HTTP://WWW.WW-XXOOXX-CH.NET |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000006534000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: Http://WwW.YlmF.CoM |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://1002.03r.info:338/13.jpg |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://182.237.1.106:333/32.exe |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://77.78.240.87/ebb.php |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://Photos.MSN.com |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://anthneic.blogspot.com/ |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://as.starware.com |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://b.ez173.com/ |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://best-pc.co.kr |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bsalsa.com/ |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://c.ez173.com/ |
Source: cpcs.exe, 00000009.00000003.2510009992.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509982383.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509409389.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509325799.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp, cpcsgui.exe | String found in binary or memory: http://cdn.stat |
Source: cpcs.exe, 00000009.00000003.2509521137.0000000003556000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn.static.mal |
Source: cpcsgui.exe | String found in binary or memory: http://cdn.static.malwa |
Source: cpcs.exe, 00000009.00000003.2509409389.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509325799.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcsgui.exe | String found in binary or memory: http://cdn.static.malwareb |
Source: cpcs.exe, 00000009.00000003.2509521137.0000000003553000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn.static.malwareb- |
Source: cpcsgui.exe | String found in binary or memory: http://cdn.static.malwareby |
Source: cpcsgui.exe | String found in binary or memory: http://cdn.static.malwarebytes |
Source: cpcsgui.exe | String found in binary or memory: http://cdn.static.malwarebytes.org/clie |
Source: cpcsgui.exe | String found in binary or memory: http://cdn.static.malwarebytes.org/client_r |
Source: cpcs.exe, 00000009.00000003.2509409389.0000000003565000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn.static.malwarebytes.org/client_resources/1.7/images/Chameleon_64x64.png |
Source: cpcsgui.exe | String found in binary or memory: http://cdn.static.malwarebytes.org/client_resources/1.7/images/FileAssassin_64x64.png |
Source: cpcs.exe, 00000009.00000003.2510041575.000000000354D000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509409389.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509521137.0000000003556000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn.static.malwarebytes.org/client_resources/1.7/images/StartupLite_64x64.png |
Source: cpcsgui.exe | String found in binary or memory: http://cdn.static.malwarebytes.org/client_resources/1.7/images/anti_rootkit_64x64.png |
Source: cpcs.exe, 00000009.00000003.2509521137.0000000003556000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn.stb |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cha.91mt.com/asp/xg.asp |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://d1.kuai8.com |
Source: cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp, cpcsgui.exe | String found in binary or memory: http://downloads.malwarebytes.org/mbam-download.php |
Source: cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509982383.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://downloads.malwarebytes.org/mbam-download.phpon |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://edits.mywebsearch.com |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geral.gratixhost.com.br/publicidade/publicidade.js |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://http.proxy.icq.com/hello |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://knock-knock-knock.info/export/code2.php?c= |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://knock-knock-knock.info/export/code2.php?c=0000000 |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://knock-knock-knock.info/export/code2.php?c=1000000 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://koxp.alcazer.com |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://link0125baixa2010.fromru.com/arroxa.exe |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://link0125baixa2010.fromru.com/arroxa.exeC: |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://redirecionamentosb.com/sw4.pac |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://redirecionamentosb.com/sw4.packer |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://saskentbbq.com/sasmate |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://sms911.ru |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000006534000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://snake.gnuchina.org |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://topagacilaboratuari.com/topagaci.com |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000006534000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2556561426.0000000007934000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://upx.sf.net |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://w.clic |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://wara6.homeftp.org/c |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://wfef5.mine.nu/config.asp |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://wsy539.myrice.com |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.6071.com/ |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.8es.cn/code/adview_pic.php |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.GoCasino.com |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.GoCasino.com11 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.Parodieront.com |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.a0?a.co0 |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.abyssmedia.com |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.abyssmedia.comion |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.abyssmedia.comz |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000006534000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.aimp.ru |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ankord.com/) |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://www.appinf.com/features/enable-partial-reads |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://www.appinf.com/features/no-whitespace-in-element-content |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://www.appinf.com/features/no-whitespace-in-element-contenthttp://xml.org/sax/features/validatio |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.baidu.com |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.best-pc.co.kr |
Source: chica-pc-shield-1-75-0-1300-en-win.exe, 00000000.00000003.2032168361.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.exe, 00000000.00000003.2795341385.0000000002100000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.exe, 00000000.00000003.2032244303.00000000020F4000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.tmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2034370148.000000000213C000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2034264033.0000000003110000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2791392614.0000000002140000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2792550502.0000000002144000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2791262908.000000000213C000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.chicalogic.com |
Source: cpcsgui.exe | String found in binary or memory: http://www.chicalogic.com/pc-shield-re |
Source: cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.chicalogic.com/pc-shield-re9 |
Source: cpcs.exe, 00000009.00000003.2510009992.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509982383.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.chicalogic.com/pc-shield-reJ |
Source: cpcs.exe, 00000009.00000003.2500648179.0000000002B4E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2500622555.0000000002B48000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.chicalogic.com/pc-shield-rei |
Source: cpcs.exe, 00000009.00000003.2510009992.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509982383.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.chicalogic.com/pc-shield-rel |
Source: cpcs.exe, 00000009.00000003.2510009992.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509982383.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.chicalogic.com/pc-shield-rew |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.chukotka.kz/cache/msn.php?id=0 |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A69B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.contoso.com/PostAccepter.aspxQ5 |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.cookst.com/sentry/api/20110306.exe |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.cookst.com/sentry/api/20110306.exeW |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.czsoft.go1.icpcn.com/ |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.desksave.de |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000007934000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.emule-project.net |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000007934000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.eyuyan.com) |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.go2000.cn |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.go2000.cn.& |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com0 |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com039~$ |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.grandesgans.com/Vista.com |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.grandesgans.com/Vista.comr. |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000006534000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533630438.000000000A445000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.heaventools.com) |
Source: chica-pc-shield-1-75-0-1300-en-win.tmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000000.2033381655.0000000000401000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: http://www.innosetup.com/ |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.jetswap.comD |
Source: cpcs.exe, 00000009.00000003.2509521137.0000000003556000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.malwarebytes.o |
Source: cpcs.exe, 00000009.00000003.2509521137.0000000003553000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.malwarebytes.oY |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.or |
Source: cpcs.exe, 00000009.00000003.2510009992.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509982383.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509409389.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509325799.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp, cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/ |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/chameleon |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/fil |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/file |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/fileass |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/fileassassin |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/mbar |
Source: cpcsgui.exe | String found in binary or memory: http://www.malwarebytes.org/products/startuplite |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.niudoudou.com/web/download/ |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.niudoudou.com/web/download/=H |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ntkrnl.com |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ntkrnl.comy |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.pdfforge.org/ |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000006534000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.qqceo.net |
Source: chica-pc-shield-1-75-0-1300-en-win.exe, 00000000.00000003.2032976073.0000000002128000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.exe, 00000000.00000003.2032819935.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.tmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000000.2033381655.0000000000401000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: http://www.remobjects.com/ps |
Source: chica-pc-shield-1-75-0-1300-en-win.exe, 00000000.00000003.2032976073.0000000002128000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.exe, 00000000.00000003.2032819935.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000000.2033381655.0000000000401000.00000020.00000001.01000000.00000004.sdmp | String found in binary or memory: http://www.remobjects.com/psU |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.rivalgaming.com/ClientPrivacyPolicy.rg0 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.skrsoftware.com/ |
Source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.super-ec.cnhttp://wghai.com/echttp://qsyou.com |
Source: cpcs.exe, 00000009.00000003.2509409389.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509325799.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcsgui.exe | String found in binary or memory: http://www.w3. |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ww-xxooxx-ch.net |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.zippay.ru/robo-pay.php?lang= |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xdinheirox.rememberit.com.au/ |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/features/external-general-entities |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/features/external-parameter-entities |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/features/namespace-prefixes |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/features/namespaces |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/features/string-interning |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/features/validation |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/properties/declaration-handler |
Source: cpcsscheduler.exe, 0000000E.00000002.3285698951.000000006BCC3000.00000002.00000001.01000000.00000015.sdmp | String found in binary or memory: http://xml.org/sax/properties/lexical-handler |
Source: C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe | Code function: 0_2_0040840C | 0_2_0040840C |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_0048053F | 1_2_0048053F |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_00470584 | 1_2_00470584 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_0046727C | 1_2_0046727C |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_004352C8 | 1_2_004352C8 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_0048DA5C | 1_2_0048DA5C |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_0043035C | 1_2_0043035C |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_004444C8 | 1_2_004444C8 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_004345C4 | 1_2_004345C4 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_00486720 | 1_2_00486720 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_00444A70 | 1_2_00444A70 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_00430EE8 | 1_2_00430EE8 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_0045EF9C | 1_2_0045EF9C |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_0045B04C | 1_2_0045B04C |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_00445168 | 1_2_00445168 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_004692DC | 1_2_004692DC |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_00445574 | 1_2_00445574 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_00487680 | 1_2_00487680 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_004519BC | 1_2_004519BC |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: 1_2_0043DD50 | 1_2_0043DD50 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005DA210 | 12_2_005DA210 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005F22DD | 12_2_005F22DD |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005EE281 | 12_2_005EE281 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005BC3C0 | 12_2_005BC3C0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005E8410 | 12_2_005E8410 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005FC4E4 | 12_2_005FC4E4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005F267B | 12_2_005F267B |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005FA62E | 12_2_005FA62E |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005DE6F0 | 12_2_005DE6F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005E47F0 | 12_2_005E47F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005C4790 | 12_2_005C4790 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005F2A4D | 12_2_005F2A4D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005FAB7F | 12_2_005FAB7F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005B4CD0 | 12_2_005B4CD0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005F8D90 | 12_2_005F8D90 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005F2E35 | 12_2_005F2E35 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005FB0D0 | 12_2_005FB0D0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005E5110 | 12_2_005E5110 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005DF3B0 | 12_2_005DF3B0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005B1410 | 12_2_005B1410 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005B5560 | 12_2_005B5560 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005FB7AC | 12_2_005FB7AC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005B5860 | 12_2_005B5860 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005D9930 | 12_2_005D9930 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005B79E0 | 12_2_005B79E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005DBB30 | 12_2_005DBB30 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005B5D40 | 12_2_005B5D40 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005F1E48 | 12_2_005F1E48 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005C3E40 | 12_2_005C3E40 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_005B1EF0 | 12_2_005B1EF0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB950F0 | 12_2_6BB950F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB57020 | 12_2_6BB57020 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB76B10 | 12_2_6BB76B10 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB5BB50 | 12_2_6BB5BB50 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB51AE0 | 12_2_6BB51AE0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB53900 | 12_2_6BB53900 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB5E8D0 | 12_2_6BB5E8D0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB68F97 | 12_2_6BB68F97 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB9EFF4 | 12_2_6BB9EFF4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB76F20 | 12_2_6BB76F20 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB9BF20 | 12_2_6BB9BF20 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BBAEF44 | 12_2_6BBAEF44 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB95DB0 | 12_2_6BB95DB0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB90CD0 | 12_2_6BB90CD0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB903E0 | 12_2_6BB903E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB53240 | 12_2_6BB53240 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB671A0 | 12_2_6BB671A0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB54133 | 12_2_6BB54133 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB66080 | 12_2_6BB66080 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB5F000 | 12_2_6BB5F000 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB68045 | 12_2_6BB68045 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB5F7CC | 12_2_6BB5F7CC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB6376C | 12_2_6BB6376C |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB925C0 | 12_2_6BB925C0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB5C480 | 12_2_6BB5C480 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB52400 | 12_2_6BB52400 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6BB62450 | 12_2_6BB62450 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F88CDF0 | 12_2_6F88CDF0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F85B9E0 | 12_2_6F85B9E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F852ED0 | 12_2_6F852ED0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F896C84 | 12_2_6F896C84 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F854C50 | 12_2_6F854C50 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F888C70 | 12_2_6F888C70 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8A4BD0 | 12_2_6F8A4BD0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F864AE0 | 12_2_6F864AE0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8A2890 | 12_2_6F8A2890 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F86A7D0 | 12_2_6F86A7D0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F85C7E0 | 12_2_6F85C7E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F86E690 | 12_2_6F86E690 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8A467F | 12_2_6F8A467F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F88A590 | 12_2_6F88A590 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F89C4D5 | 12_2_6F89C4D5 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F852420 | 12_2_6F852420 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F888390 | 12_2_6F888390 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F892310 | 12_2_6F892310 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F86A1F0 | 12_2_6F86A1F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8A412E | 12_2_6F8A412E |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8700A0 | 12_2_6F8700A0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F89C0ED | 12_2_6F89C0ED |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8A5FE4 | 12_2_6F8A5FE4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F89BD1B | 12_2_6F89BD1B |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F86BD60 | 12_2_6F86BD60 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F869C00 | 12_2_6F869C00 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F86FAA0 | 12_2_6F86FAA0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F88DAB0 | 12_2_6F88DAB0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8739F0 | 12_2_6F8739F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F89B97D | 12_2_6F89B97D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F861720 | 12_2_6F861720 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F873720 | 12_2_6F873720 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F89B4E8 | 12_2_6F89B4E8 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F86B370 | 12_2_6F86B370 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8A52AC | 12_2_6F8A52AC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F86F260 | 12_2_6F86F260 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_2_6F8511E0 | 12_2_6F8511E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: 12_3_033C236A | 12_3_033C236A |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_008EC0D0 | 14_2_008EC0D0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0091B027 | 14_2_0091B027 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_009091D0 | 14_2_009091D0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_009211DF | 14_2_009211DF |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_008EE140 | 14_2_008EE140 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0091D3F0 | 14_2_0091D3F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0091F3F0 | 14_2_0091F3F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_009103F0 | 14_2_009103F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0091B3F9 | 14_2_0091B3F9 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_008E3520 | 14_2_008E3520 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0091A7F4 | 14_2_0091A7F4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0091B7E1 | 14_2_0091B7E1 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_00921730 | 14_2_00921730 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0090C740 | 14_2_0090C740 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_00907870 | 14_2_00907870 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_00922B44 | 14_2_00922B44 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_0091AC89 | 14_2_0091AC89 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_00920C8E | 14_2_00920C8E |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_00921E0C | 14_2_00921E0C |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_00906F90 | 14_2_00906F90 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB950F0 | 14_2_6BB950F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB57020 | 14_2_6BB57020 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB76B10 | 14_2_6BB76B10 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB5BB50 | 14_2_6BB5BB50 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB51AE0 | 14_2_6BB51AE0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB53900 | 14_2_6BB53900 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB5E8D0 | 14_2_6BB5E8D0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB68F97 | 14_2_6BB68F97 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB9EFF4 | 14_2_6BB9EFF4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB76F20 | 14_2_6BB76F20 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB9BF20 | 14_2_6BB9BF20 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BBAEF44 | 14_2_6BBAEF44 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB95DB0 | 14_2_6BB95DB0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB90CD0 | 14_2_6BB90CD0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB903E0 | 14_2_6BB903E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB53240 | 14_2_6BB53240 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB671A0 | 14_2_6BB671A0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB54133 | 14_2_6BB54133 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB66080 | 14_2_6BB66080 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB5F000 | 14_2_6BB5F000 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB68045 | 14_2_6BB68045 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB5F7CC | 14_2_6BB5F7CC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB6376C | 14_2_6BB6376C |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB925C0 | 14_2_6BB925C0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB5C480 | 14_2_6BB5C480 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB52400 | 14_2_6BB52400 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6BB62450 | 14_2_6BB62450 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F88CDF0 | 14_2_6F88CDF0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F85B9E0 | 14_2_6F85B9E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F852ED0 | 14_2_6F852ED0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F896C84 | 14_2_6F896C84 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F854C50 | 14_2_6F854C50 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F888C70 | 14_2_6F888C70 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8A4BD0 | 14_2_6F8A4BD0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F864AE0 | 14_2_6F864AE0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8A2890 | 14_2_6F8A2890 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F86A7D0 | 14_2_6F86A7D0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F85C7E0 | 14_2_6F85C7E0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F86E690 | 14_2_6F86E690 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8A467F | 14_2_6F8A467F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F88A590 | 14_2_6F88A590 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F89C4D5 | 14_2_6F89C4D5 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F852420 | 14_2_6F852420 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F888390 | 14_2_6F888390 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F892310 | 14_2_6F892310 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F86A1F0 | 14_2_6F86A1F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8A412E | 14_2_6F8A412E |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8700A0 | 14_2_6F8700A0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F89C0ED | 14_2_6F89C0ED |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8A5FE4 | 14_2_6F8A5FE4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F89BD1B | 14_2_6F89BD1B |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F86BD60 | 14_2_6F86BD60 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F869C00 | 14_2_6F869C00 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F86FAA0 | 14_2_6F86FAA0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F88DAB0 | 14_2_6F88DAB0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8739F0 | 14_2_6F8739F0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F89B97D | 14_2_6F89B97D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F861720 | 14_2_6F861720 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F873720 | 14_2_6F873720 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F89B4E8 | 14_2_6F89B4E8 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F86B370 | 14_2_6F86B370 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8A52AC | 14_2_6F8A52AC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F86F260 | 14_2_6F86F260 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: 14_2_6F8511E0 | 14_2_6F8511E0 |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: V2\custom\Project1.vbpQ |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 3)\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: +tub.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Basic\nLoader\Projekt1.vbp3 |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 20 Prof Updater\Project1.vbpo |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\????????????.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ouveau dossier (3)\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AD:\??????.vbpyc |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: v5\Server\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AC:\????????.vbp>d |
Source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\Windows.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Logoff.vbp |
Source: cpcs.exe, 00000009.00000003.2533630438.000000000A445000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Documents and Settings\Administrador\Desktop\new project\New_Project1.vbp? |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: N\IEAdBlocker.vbp% |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\????????????.vbpOc |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *\AC:\??????.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AJ:\Jhocko\Loader\Loader.vbpw |
Source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004E63000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: (*\AC:\SteveMac\VB6\Controls\S-Grid5\pVBALGrid6.vbpH\ |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\??????.vbp?c |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ????.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: uveau dossier (3)\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \calculator.vbp |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\GroundPlayer.vbpen# |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\DZYA.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: z1.vbpY |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000006534000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.VBPacked && SIZE=240000, 265000 && RESOURCE=RT_ICON, 1403, AAD517AAD504CBEE04CBEE04CBEE04CBEE3ABEDA32AA6492454D92454DA6666A2D3ECC4E77D72B42D42831CA2D3ECC2D3ECC2F9059 && PESECTION=1, * && VOFFSET=424, 8, 15, 504543 |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\pzFBNe.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: _Generated-3\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Server\winlog.vbp |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\????????????????????.vbpe1WH4 |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *\AC:\????????????????\Modif\ica\??????????????\Computer ???? ??????ica d orp\???????????? ???????????? ??r EMINEMOr????????a.vbp |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: mmmm?.vbp |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \M3\Desktop\CR\ST\S.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Santos\Desktop\Stub\stub.vbp |
Source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *\AF:\untitled01\new\7\tools\backup\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: itc\it_inst\Project1.vbp=, |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AZ:\q\q.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\??????.vbp |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AC:\sethc.vbpu |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Mdx 0\Osigsnad drsydcao1.vbp0000 |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: oGachi to Gachito.vbpC. |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: M3\Desktop\Machine\Setup.vbpZ |
Source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: @*\AC:\Project1.vbpown65 |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\??????????.vbp^c |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\??????.vbpEc |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Win11\DirtyBusinessNewMod.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\dTtI.vbpbp |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \EXE\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AH:\V1.0\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: D:\????????.vbp! |
Source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Bureau\Copie de Nouveau dossier (3)\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CommonDialog_Class.vbp |
Source: cpcs.exe, 00000009.00000003.2533526590.000000000A5DD000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2534960911.000000000A5DD000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Bureau\Copie de Nouveau dossier (3)\Project1.vbpQ |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: john\Desktop\Stub\stub.vbpN |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: NYHOMv.vbpN~ |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Priv8\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \GoogleGroupsBHO.vbpW |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *\AD:\Projekt1.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \GoogleGroupsBHO.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\????????????.vbpcc |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: New Folder\Project1.vbp |
Source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004E5C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: .*\AC:\SteveMac\VB6\XHELPE~1\SSubTmr\SubTimer6.vbp |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 0zcyfqrkkdgt opgz|kxrcbpWqe|oml6.vbp |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: fgf.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \newwish\uniedit.vbp |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \serv\Project1.vbp |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\??????????????.vbp?A |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \JKMobile.vbp |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: z1.vbper |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Simple\Stub\stub.vbp8 |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AC:\????????.vbp"c |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\????????.vbpHc |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: io\deho\deho.vbp |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\??????????????????.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AC:\??????.vbp,c |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *\AC:\Stub3\GqtM3.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\Nero.vbp |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \newwish\uniedit.vbpxe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000007934000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.VBPassSteal && STRINGS=1169, 62737465616C65725F6C6F6164 && STRINGS=128, B71207DBF3736988F3736988F3736988 && STRINGS=987, 332E30300055505821 |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \puxa vb\viks.vbp7 |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Server\winlog.vbpn |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Tool Febrero\Proyecto1.vbp |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: sax 0\Pdoaeatsd.vbpq |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\????????????????????????????.vbpTY |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PCsig2\stub\STUB.vbp' |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *\AE:\Projekt1.vbp9 |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Santa\Project1.vbpU |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\??????.vbprc |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Mdx 0\Osigsnad drsydcao1.vbpsL |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \_new3_test_006\project1.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\????????.vbp |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \IMPORTANT.vbp>s |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X\Server\Project1.vbpn |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Y:\code\prog\my\mycall.vbp |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: free\leader\driver.vbp |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4D7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Generated-1\Project1.vbp^ |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\ssss\VEhvdQTbQ.vbp |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AC:\??????????.vbp |
Source: C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msvbvm60.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: vb6zz.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbam.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: advpack.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: olepro32.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: asycfilt.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbamcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dataexchange.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dcomp.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msiso.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mshtml.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: srpapi.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbamnet.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msimtf.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: apphelp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: mbam.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: mbamnet.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: iphlpapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: wtsapi32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: windows.storage.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: wldp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: profapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: cryptsp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: rsaenh.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: apphelp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: mbam.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: mbamnet.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: userenv.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: wtsapi32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: iphlpapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: wtsapi32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: windows.storage.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: wldp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: profapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: cryptsp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: rsaenh.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Section loaded: cryptbase.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msvbvm60.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: vb6zz.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: uxtheme.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: sxs.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbam.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: windows.storage.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wldp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: profapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: cryptsp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: rsaenh.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: cryptbase.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: apphelp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: advpack.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: olepro32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: asycfilt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbamcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: userenv.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mpr.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wtsapi32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msasn1.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winsta.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: sspicli.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ntmarta.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dataexchange.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d3d11.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dcomp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dxgi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: twinapi.appcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: textshaping.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ieframe.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: iertutil.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: netapi32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winhttp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wkscli.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: netutils.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: propsys.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: urlmon.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: srvcli.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msiso.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mshtml.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: powrprof.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: umpdc.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: srpapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: textinputframework.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coremessaging.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coremessaging.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbamnet.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: iphlpapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msimtf.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msls31.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d2d1.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dwrite.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: resourcepolicyclient.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d3d10warp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dxcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: secur32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mlang.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wininet.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mswsock.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dnsapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: rasadhlp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winnsi.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msvbvm60.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: vb6zz.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: uxtheme.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: sxs.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbam.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: version.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: windows.storage.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wldp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: profapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: cryptsp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: rsaenh.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: cryptbase.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: apphelp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: advpack.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: olepro32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: asycfilt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbamcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: userenv.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mpr.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wtsapi32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msasn1.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winsta.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: sspicli.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ntmarta.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dataexchange.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d3d11.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dcomp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dxgi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: twinapi.appcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: textshaping.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: ieframe.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: iertutil.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: netapi32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: winhttp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wkscli.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: netutils.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: propsys.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: urlmon.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: srvcli.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msiso.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mshtml.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: powrprof.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: umpdc.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: textinputframework.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coremessaging.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: coremessaging.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wintypes.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: srpapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mbamnet.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: iphlpapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msimtf.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: msls31.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d2d1.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dwrite.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: resourcepolicyclient.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: d3d10warp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dxcore.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: secur32.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mlang.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: wininet.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: mswsock.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: dnsapi.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: rasadhlp.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: aclayers.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: sfc_os.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\regsvr32.exe | Section loaded: msvbvm60.dll | |
Source: | Binary string: \ResBegleiter\obj\x86\Release\Devi.pdbb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\XRoot_Build\XC\Vm\Release\x86\StubExe.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Server.pdb source: cpcs.exe, 00000009.00000003.2535416200.000000000A6BE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \obj\Release\Welp.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \obj\Release\Welp.pdbY{ source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: miniloader-patchdate-stub.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: DarkShell\Server\svchost\Debug\Serverz.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: w:\Project\!lego2new\lego_2011.xx.xx_2.xx\release\NSP.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: se\NSP.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\USERS\DEFAULT\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545034326.000000000E01A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \sw_modem\HSF_HWICH\i386\HSFHWICH.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptnet.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\key\sar\Debug\sar.pdbre source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\dll\mbam.dll\build\mbam.pdb source: cpcsgui.exe, 0000000C.00000002.2571547852.000000006F8B1000.00000002.00000001.01000000.0000000F.sdmp |
Source: | Binary string: Intel Corporationse\NSP.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vpamjon.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NB10??????N????:\??????????\??W????????\????????????????????????????????????????G????\????????????\??????\????????????.pdbj source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: hnetmon.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sass.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\Cryptor\stub6\Release\stub6.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: !lego2new\lego_2011.xx.xx_2.xx\release\NSP.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\UMPk.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\exe\mbampt.exe\build\mbampt.pdb%0A source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004F26000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\WINDOWS\SERVICEPROFILES\NETWORKSERVICE\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545306895.000000000E06C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Release\AvG.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Release\AvG.pdb>M source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: D:\TranceCo.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: E:\WFD\Tools\Server\_Downloader\Share\SFX Package\Pack\obj\x86\Debug\Pack.pdbE source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\USERS\user\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545034326.000000000E01A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fukmp.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NB10??????N????:\??????????\??W????????\????????????????????????????????????????G????\????????????\??????\????????????.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ????????????????.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: aspergillus.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bk22\kloader\Release\i386\kloader.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\Dell\Desktop\SOMA.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fukmp.pdb% source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: p:\vc5\x64\release\resident.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: F:\NTDDK\DEMO\_DarkTest\i386\DarkTest.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\dll\mbam.dll\build\mbam.pdb` source: cpcsgui.exe, 0000000C.00000002.2571547852.000000006F8B1000.00000002.00000001.01000000.0000000F.sdmp |
Source: | Binary string: C:\dev\stuk_rar\release\setup.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\exe\mbamscheduler.exe\build\mbamscheduler.pdb source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004EC9000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\WINDOWS\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545034326.000000000DF4E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\PROGRAM FILES (X86)\FACEHACK\FACEHACK.PDB%vz$ source: cpcs.exe, 00000009.00000003.2546311082.000000000D10C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sfxrar32\Release\sfxrar.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Socksbuilder\stub\release\stub.pdbeb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ent.pdb0?0A source: cpcs.exe, 00000009.00000003.2533784758.000000000A13A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sxtyy.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ?????.pdbr source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: EXTRA=Adware.Agent, %PROGRAMFILES%\Isilo\iSiloDisplaySample.pdb, DP source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: db.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2534960911.000000000A69B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Nuova cartella\myform\myform\obj\Release\myform.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $:\tmp\test.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\??????????????????????????????????????.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: z(1)\stub\Release\stub.pdbtor source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ??:\??????????\??W????????\????????????????????????????????????????G????\????????????\??????\????????????.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: x:\werdon.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\d\objfre_wxp_x86\i386\HG.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: z(1)\stub\Release\stub.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: p:\vc5\x64\release\resident.pdbO6 source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ent.pdb source: cpcs.exe, 00000009.00000003.2533784758.000000000A13A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work_temp\utf8\test2\Release\test2.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e:\job\gh0st1.0\Release\Loader.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: URGABPW.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TDIMUED.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: hnetmon.pdbU source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vpamjon.pdbd9 source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \accs\accs\accs\obj\Release\accs.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: REAPER\Stub\stub rc\obj\Release\stub rc.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: w:\Project\!lego2new\lego_2011.xx.xx_2.xx\release\NSP.pdb/ source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\key\sar\Debug\sar.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ryptnet.pdb source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533526590.000000000A5A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Projects\reg\reg\obj\Debug\reg.pdbn source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sxtyy.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WWMWCMGV.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptnet.pdbB source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Projects\reg\reg\obj\Debug\reg.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: HookDllDriver\objfre\i386\hookdll.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NGPCorp\DLL\Release\DLL.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sfxrar32\Release\sfxrar.pdbPY source: cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Prevazatorul.pdb[ source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\TP\AppData\Local\Temp\zy3gqjbl.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \AccountCreator.pdbk source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: F:\NTDDK\DEMO\_DarkTest\i386\DarkTest.pdbem source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Bacipy.pdb source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533630438.000000000A445000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: IEXPLORE\Debug\wibvusd.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: 8$W:\w\Loader.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vCrypt Stub.pdb source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Prevazatorul.pdb source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: &:\UMPk.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ?????.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \ResBegleiter\obj\x86\Release\Devi.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\tmp\test.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ld.pdb source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529941329.000000000A2A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\utf8\test2\Release\test2.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \AccountCreator.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: XC\Vm\Release\x86\StubExe.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Z:\xampp\htdocs\project-727,Permutation\stable\tmp\PDBSIG.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :\Fecira.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb)] source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Project1\Project1\obj\Release\Project1.pdb<. source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: W:\w\Loader.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bk22\kloader\Release\i386\kloader.pdbt,n source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\test\test2\Release\test2.pdb< source: cpcs.exe, 00000009.00000003.2529454596.000000000A126000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Projects\War Crypter\Release\Stub.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: D:\SVN Control Code\app_client\Loader\Release\Loader.pdb?_ source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Project1\Project1\obj\Release\Project1.pdb source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WWMWCMGV.pdb=; source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ??@RSDS??????????????????????????????????o.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \w.a.t.c.h\w.a.t.c.h\obj\Release\w.a.t.c.h.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e:\job\gh0st1.0\Release\Loader.pdb\ source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\APPDATA\LOCAL\TEMP\FACEBOOK\FACEBOOK STEALER.PDB source: cpcs.exe, 00000009.00000003.2545306895.000000000E06C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\XRoot_Build\XC\Vm\Release\x86\StubExe.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\test\test2\Release\test2.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529454596.000000000A126000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \x86\Debug\Balle2.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: E:\WFD\Tools\Server\_Downloader\Share\SFX Package\Pack\obj\x86\Debug\Pack.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Emuhucuqih.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: IEXPLORE\Debug\wibvusd.pdbR source: cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: XC\Vm\Release\x86\StubExe.pdbX source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c:\work\test\test2\Release\test2.pdbd source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Tr0gdor\Rxbot 7.6\Debug\rBot.pdbz source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: o.pdb source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: note.pdb source: cpcs.exe, 00000009.00000003.2535475306.000000000B056000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\dtcser\sys\i386\killvv.pdb source: cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: EXTRA=Password.Stealer, %TEMP%\Facebook\Facebook Stealer.pdb, DP source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\key\lasass\Debug\lasass.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: vCrypt Stub.pdb7 source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: D:\SVN Control Code\app_client\Loader\Release\Loader.pdb source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: x:\werdon.pdb source: cpcs.exe, 00000009.00000003.2535304844.0000000009F2B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \MyProjects\eMule\Debug\eMule.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\SVN\mbam\exe\mbampt.exe\build\mbampt.pdb source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2789847670.0000000004F26000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: Socksbuilder\stub\release\stub.pdb source: cpcs.exe, 00000009.00000003.2535574656.000000000A39A000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Tr0gdor\Rxbot 7.6\Debug\rBot.pdb source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cm_acl.pdb source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\dtcser\sys\i386\killvv.pdb+ source: cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Double Onesass.pdbx7 source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareUser.exe |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && SIZE=10000000, 15000000 && VERSION=1, VMware? Inc. && VERSION=3, 6.0.2 build-59824 && VERSION=7, vmware.exe |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && SIZE=20000, 150000 && VERSION=1, VMware? Inc. && VERSION=3, 8.4.5.14951 && VERSION=7, VMwareTray.exe && STRINGS=464, 50454332764F |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && VERSION=7, VMwareUser.exe && STRINGS=6592, 5045436F6D7061637432 |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.FakeAlert, HKCR\VMwareApp.VMware* |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Bot, HKLM\System\CurrentControlSet\Services\VMwareService |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && SIZE=25000, 300000 && VERSION=1, VMware? Inc. && VERSION=3, 6.0.2 build-59824 && VERSION=7, vmware.exe |
Source: cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMWARE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000007934000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Backdoor.Bot && DIGISIG=FALSE && VERSION=1, %NULL% && VERSION=4, vmnethcp.exe && STRINGS=%PE2% - 1276, 420069006F004300720065006400500072006F0076002E006500780065 && STRINGS=128, 504500004C010300 && STRINGS=216, 00000000 |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SYSTEM\CurrentControlSet\Services\NetDDEVMTools |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|VMware process Tool=*\help.exe* |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %USERROOT%\Local Settings\VMwareDnD\QTTask.exe |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Worm.KoobFace && VERSION=1, VMware? Inc.* && STRINGS=48, 000000000000000000000000D80000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A2400000000000000????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????52696368????????0000000000000000504500004C010400????????0000000000000000E0000F010B01????00??000000??000000????00????00000010000000??00000000400000100000000200000400000005000100040000000000000000????0000040000????0100020000800000??0000??00000000??0000??000000000000100000000000000000000000????0000????000000????00????0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000????0000??000000??????00??000000000000000000000000??0000??0000000000000000000000000000000000000000000000000000002E636F6465000000????00000010000000??000000040000000000000000000000000000200000602E64617461000000????000000??000000??000000??0000000000000000000000000000400000C02E72646174610000????000000????0000??000000??000000000000000000000000000040000040??????????????????????0000????0000????0000??0000000000000000000000000000C0000040 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Spyware.Zbot && VERSION=2, VMware Tools Core Service && STRINGS=128, AB5FE84BEF3E8618EF3E8618EF3E86186C228818EE3E861886218F18F33E861806218B18EE3E861852696368EF3E8618 && STRINGS=432, 2E7465787400000000F0040000100000008A02000002000050454332774F000000000000600000E02E72737263000000 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Spybot && VERSION=1, VMware? Inc. && VERSION=3, 8.4.6.16648 && VERSION=7, VMUpgradeHelper.exe && PESECTION=2, .rsrc |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Backdoor, %PROGRAMFILES%\VMware NAT\kav.dll |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent.VM, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|VMWARE=*\read.exe* |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|hgfsg |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware WorkstationrL= |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareUser.exeSd |
Source: cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware? Inc.um |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Backdoor.PcClient && SIZE=1605590, 1665590 && VERSION=7, Copyright 1998-2010 VMware?Inc. |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.SpyNet, %SYSDIR%\Resource\VMware.exe |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Worm.KoobFace && VERSION=7, VMwareUser.exe && VOFFSET=448, 8, 4, 504543 && STRINGS=128, 98BCE83BDCDD8668DCDD8668DCDD86685FC18868DDDD866893FF8F68C1DD8668EAFB8B68DDDD866852696368DCDD8668 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.ServStart && VERSION=1, ? && VERSION=4, VMware Workstationr && VERSION=8, VMware Workstationd |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Backdoor.Messa && VERSION=1, %NULL% && VERSION=7, */VMWare Machine/Desktop/* && VERSION=8, %NULL% |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|VMware * process=*\kernel##.exe* |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000009734000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WHITE=\VMware\VMware Server\vmapplib.dll |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMSrvc.exeY& |
Source: cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware? Inc. |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Backdoor.Agent && VERSION=1, VMware? Inc. && VERSION=2, %NULL% && VERSION=3, 22.01.#### && VERSION=5, %NULL% && VERSION=7, #.exe && PESECTION=1, UPX0 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.FakeMS && VERSION=1, Microsoft Corporation && VERSION=7, VMSrvc.exe && PESECTION=1, .code_01 && VOFFSET=230, 8, 3, 0221 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && VERSION=7, VMwareUser.exe && STRINGS=7820, 5045436F6D7061637432 |
Source: cpcs.exe, 00000009.00000003.2545034326.000000000DFB4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SYSTEM\VMWARESERVICE.EXE C"n |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Zlob, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run|VMware hptray |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %PROGRAMFILES%\VMware\Windows Messenger\tao.ico, DP |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && PATTERN=**\go.exe && VERSION=1, VMware? Inc. && VERSION=7, usbRun.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Bot, %WINDIR%\System\VMwareService.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run|VMware? Inc. |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Worm.AutoRun, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|MwareUser=*\VMware Tools\MwareUser.exe* |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.VB && SIZE=1000, 600000 && VERSION=1, VMware? Inc. && VERSION=3, 6.5.2 build-156735 && VERSION=7, ace_upgrade.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Bot, %WINDIR%\vmware-tray.exe |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && SIZE=400000, 600000 && VERSION=3, 8.4.5.14951 && VERSION=7, VMwareUser.exe |
Source: cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware? Inc.& |
Source: cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware? Inc., |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Backdoor, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|vmware remotemks=*System32\vmremotems.exe* |
Source: cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VBoxService.exek |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware? Inc.0 |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: */VMWare Machine/Desktop/*$ |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmware.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run|VMware? Inc. |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && VERSION=1, VMware? Inc. && VERSION=4, VMwareUser && STRINGS=11632, 5045436F6D7061637432 |
Source: cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VIRTUALVMWAREQEMU |
Source: chica-pc-shield-1-75-0-1300-en-win.tmp, 00000001.00000003.2792960995.00000000006B2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\d |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware Workstationdn |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|VMware admin Tool=*\Fonts##.exe* |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A5B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware WorkstationdP= |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Infostealer.Gampass, %SYSDIR%\VMware.dll, NV |
Source: cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmware-hosts |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Worm.KoobFace && VERSION=7, VMwareTray.exe && VOFFSET=448, 8, 4, 504543 && STRINGS=128, D1187782957919D1957919D1957919D1166517D1947919D1DA5B10D19B7919D1A35F14D1947919D152696368957919D1 |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware? Inc.< |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon|Shell=*vmnethcp.exe* |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Spyware.Password && VERSION=1, VMware? Inc. && STRINGS=456, 50454332 |
Source: cpcs.exe, 00000009.00000003.2544527727.000000000D6DB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\PROGRAM FILES (X86)\VMWARE FILES\VMNETDHCP.EXE |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMWARE BEST VIRTUAL |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Worm.KoobFace && VERSION=7, vmware-fullscreen.exe && STRINGS=128, 695EEBF12D3F85A22D3F85A2E16F95C222609AC2E36F95C22260CBC2A16E95C2 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Downloader && SIZE=10000, 400000 && VERSION=3, 7.0.1 build-227600 && VERSION=7, vmware.exe |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware WorkstationrGeno |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && VERSION=1, Photoshop && VERSION=7, Simon Inc.exe && VERSION=8, VMWARE BEST VIRTUAL |
Source: cpcs.exe, 00000009.00000003.2533842656.000000000A4B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware Tools Core Service |
Source: cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VBoxService.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Downloader, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run|hgfstikyc |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareTray.exeZc |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && VERSION=7, VMwareService.exe && STRINGS=128, C25247E5863329B6863329B6A27C95DF61739ADFA07C95DF785F89DFE27D95DF585F8CDFBF7C95DF61739ADFA37C95DF6173CADF807C95DF61739ADFAE7C95DF585F8CDFA37C95DF52696368863329B600000000000000005045 |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Agent && VERSION=7, VMwareUser.exe && STRINGS=128, BD1FAAC9F97EC49AF97EC49AF97EC49A7A62CA9AF87EC49A9061CD9AD07EC49A1061C99AF87EC49A52696368F97EC49A && STRINGS=472, 50454332774F0000 |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %USERROOT%\Templates\vmnethcp.exe |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware? Inc.=l |
Source: cpcs.exe, 00000009.00000003.2546561141.000000000BF7E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMWAREAPP.VMWARE*TE |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.Zbot && VERSION=1, VMware? Inc. && STRINGS=584, 494E4954 && STRINGS=624, 2E7864617461 |
Source: cpcs.exe, 00000009.00000003.2545306895.000000000DFF8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\VMWARE-TRAY.EXE |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareUser.exeDc |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareUser |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SYSTEM\CurrentControlSet\Services\ShellHWDetectionVMTools |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.FakeAlert && VERSION=1, VMware? Inc. && VERSION=7, vmware.exe && PESECTION=1, UPX0 && STRINGS=%PE3% + 240, 426F6D65 |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKCU\Software\Microsoft\Windows\CurrentVersion\Run|Microsoft Routing Utilities=*\vmnethcp.exe* |
Source: cpcs.exe, 00000009.00000003.2561266540.0000000003D26000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: POLY=Trojan.VB && SIZE=80000, 900000 && VERSION=1, VMware? Inc. && VERSION=3, 6.5.2 build-156735 && VERSION=7, hqtray.exe |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmware.exe6l |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.JRQService, HKLM\SYSTEM\CurrentControlSet\SERVICES\VMWARE APPLICATIONSJRQ |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|VMWARES=*\spooles.exe* |
Source: C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe | Code function: GetLocaleInfoA, | 0_2_0040520C |
Source: C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe | Code function: GetLocaleInfoA, | 0_2_00405258 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: GetLocaleInfoA, | 1_2_00408568 |
Source: C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp | Code function: GetLocaleInfoA, | 1_2_004085B4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, | 12_2_005E860D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, | 12_2_005F06F9 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, | 12_2_005F6897 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, | 12_2_005F09E7 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, | 12_2_005F4EFC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 12_2_005F4FD6 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, | 12_2_005ED05D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoA, | 12_2_005EB419 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 12_2_005F172C |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 12_2_005F1821 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, | 12_2_005F18C8 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, | 12_2_005F1923 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 12_2_005F1AF4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, | 12_2_005EFA9D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 12_2_005F1BB4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, | 12_2_005F1C57 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 12_2_005F1C1B |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 12_2_6BBAEBF0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, | 12_2_6BBAEA1F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, | 12_2_6BBAE9C4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 12_2_6BBAE91D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 12_2_6BBAE828 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, | 12_2_6BBB0F1E |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 12_2_6BBAED17 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, | 12_2_6BBAED53 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 12_2_6BBAECB0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoA, | 12_2_6BBB1053 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, | 12_2_6F89AFC3 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, | 12_2_6F89CF1A |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, | 12_2_6F89AF68 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 12_2_6F89AEC1 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 12_2_6F89ADCC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, | 12_2_6F898D56 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoA, | 12_2_6F89462F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, | 12_2_6F8925C7 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 12_2_6F8A0575 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, | 12_2_6F8A049B |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, | 12_2_6F899CA0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, | 12_2_6F8999B2 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, | 12_2_6F89F43F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 12_2_6F89B2BB |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, | 12_2_6F89B2F7 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 12_2_6F89B254 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 12_2_6F89B194 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 14_2_0091A0D8 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, | 14_2_0091806B |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 14_2_0091A1CD |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, | 14_2_00917121 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, | 14_2_0091A2CF |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, | 14_2_0091A274 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 14_2_0091A4A0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, | 14_2_00912447 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 14_2_0091A5C7 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 14_2_0091A560 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, | 14_2_0091A603 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, | 14_2_0091C63D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoA, | 14_2_0091C772 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 14_2_009168FE |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, | 14_2_00916824 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, | 14_2_009199CE |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, | 14_2_00917D7D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 14_2_6BBAEBF0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, | 14_2_6BBAEA1F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, | 14_2_6BBAE9C4 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 14_2_6BBAE91D |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 14_2_6BBAE828 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, | 14_2_6BBB0F1E |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 14_2_6BBAED17 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, | 14_2_6BBAED53 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 14_2_6BBAECB0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoA, | 14_2_6BBB1053 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, | 14_2_6F89AFC3 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, | 14_2_6F89CF1A |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, | 14_2_6F89AF68 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 14_2_6F89AEC1 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 14_2_6F89ADCC |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, | 14_2_6F898D56 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoA, | 14_2_6F89462F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, | 14_2_6F8925C7 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 14_2_6F8A0575 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, | 14_2_6F8A049B |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, | 14_2_6F899CA0 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, | 14_2_6F8999B2 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, | 14_2_6F89F43F |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, | 14_2_6F89B2BB |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, | 14_2_6F89B2F7 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, | 14_2_6F89B254 |
Source: C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 14_2_6F89B194 |
Source: cpcs.exe, 00000009.00000003.2545034326.000000000DF4E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\DEFAULT\TEMPLATES\AVG\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2546029145.000000000D30A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\PROGRAM FILES\WINRAR\FORMATS\KAVSTART.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apvxdwin.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsaua.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AYAGENT.AYE |
Source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A55F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: avcenter.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVINSTALL.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APORTS.EXE |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: LIVESRV.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tisspwiz.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boxmod.exe |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: sched.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\quhlpsvc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %PROGRAMFILES%\Windows NT\kav.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Banker, %USERROOT%\Local Settings\Application Data\nod32.exe |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: NOD32.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ATF-CLEANER.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CAVASM.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\DEFAULT\LOCAL SETTINGS\APPLICATION DATA\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srengps.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CAFW.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\psimsvc.exe |
Source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: fast.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BUSCAREG.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fih32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ahnsdsv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fch32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsaa.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\A2SCAN.EXE |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC0A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\DOCUMENTS\SYSTEM\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, %WINDIR%\Resources\temas\Windows.exe\rundll32\avgnt.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav.exe |
Source: cpcs.exe, 00000009.00000003.2544897121.000000000DD58000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\NETWORKSERVICE\LOCAL SETTINGS\APPLICATION DATA\MICROSOFT\WINDOWS DEFENDER\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwebscd.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsmb32.exe |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 360rpt.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scanwscs.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spf.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDFix.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVIRARKD.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scanmsg.exe |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: nod32krn.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavfnsvr.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlclient.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lordpe.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\virusutilities.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\psctrls.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hijackthis.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsma32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfwsvc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\processmonitor.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guard.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xcommsvr.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Worm.AutoRun, %WINDIR%\Virus.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVKPROXY.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvmonxp.kxp |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcagent.exe |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SYSTEM32\CONFIG\SYSTEMPROFILE\TEMPLATES\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnsx.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Rogue.MultipleAV, %USERROOT%\Local Settings\Application Data\Microsoft\Windows Defender\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, %ROOTDRIVE%\Nueva carpeta\install\virus.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APM.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spiderui.exe |
Source: cpcs.exe, 00000012.00000003.2840443937.000000000E02A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\TEMPLATES\AVG\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashwebsv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav.exe |
Source: cpcs.exe, 00000009.00000003.2529369405.0000000009D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ndows\CurrentVersion\App Paths\360safe.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ASVIEWER.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arcacheck.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsdfwd.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spiderml.exe |
Source: cpcs.exe, 00000009.00000003.2544720380.000000000D6EC000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2544527727.000000000D6DB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\DEFAULT\APPDATA\ROAMING\AVG\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Banker, %SYSDIR%\avgnt.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Rogue.MultipleAV, %USERROOT%\Local Settings\Application Data\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\acals.exe |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC0A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\NETWORKSERVICE\DOCUMENTS\SYS\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmdagent.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\A2GUARD.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\acaegmgr.exe |
Source: cpcs.exe, 00000009.00000003.2546561141.000000000BF7E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SYSTEM32\CONFIG\SYSTEMPROFILE\LOCAL SETTINGS\APPLICATION DATA\MICROSOFT\WINDOWS DEFENDER\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ASWCLNR.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccprovsp.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsTray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %APPDATA%\sched.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %APPDATA%\MsMpEng.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Procmon.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\acaas.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgscanx.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent.DC, %SYSDIR%\iExplorer\iefix.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defwatch.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam-setup.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Messa, %APPDATA%\virus.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.XTRat, %WINDIR%\avast\nod32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgtray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsrte.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %TEMP%\MsMpEng.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %ROOTDRIVE%\windy\Nod32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvsrvxp.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %SYSDIR%\wbem\360tray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-stopw.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.MultipleAV.Gen, %TEMP%\mtg\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CAPFUPGRADE.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsAuxs.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avz.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AFMAIN.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\A2HIJACKFREESETUP.EXE |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: avgtray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HJTInstall.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sched.exe |
Source: cpcs.exe, 00000009.00000003.2529281722.0000000009BA5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: procexp.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsm32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BOOTSAFE.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, %SYSDIR%\InstallDir\avgnt.exe |
Source: cpcs.exe, 00000009.00000003.2510009992.0000000003565000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2500648179.0000000002B4E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2500622555.0000000002B48000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2510085331.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509982383.000000000355F000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2509920343.000000000354D000.00000004.00000020.00020000.00000000.sdmp, cpcsgui.exe | Binary or memory string: $vars\commonappdata$\mbam-setup.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccenter.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vba32ldr.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcmgr.exe |
Source: cpcs.exe, 00000009.00000003.2533526590.000000000A5C7000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533704715.000000000A5CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: MSASCUI.exe |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC0A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\DOCUMENTS\SYS\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gmer.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %TEMP%\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spybotsd.exe |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\PUBLIC\LOCAL SETTINGS\APPLICATION DATA\AVG\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CATCHME.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, %SYSDIR%\install\virus.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\A2HIJACKFREE.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\umxcfg.exe |
Source: cpcs.exe, 00000009.00000003.2544897121.000000000DD58000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\user\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\AVGUARD.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmbmsrv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.MultipleAV, %USERROOT%\Templates\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CAGLOBALLIGHT.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ufseagnt.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravmond.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscan.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\onlnsvc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\COMBOFIX.SCR |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\PUBLIC\LOCAL SETTINGS\APPLICATION DATA\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\onlinent.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portdetective.exe |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HijackThis.exe |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\PUBLIC\LOCAL SETTINGS\APPLICATION DATA\NOD32.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\COMBOFIX.BAT |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ACS.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmproxy.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TeaTimer.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SUPERAntiSpyware.exe |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Procexp.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav95.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ufnavi.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgupd.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %MYDOCS%\SYS\msascui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLAMTRAY.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSafeTray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\A2START.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsGui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVMENU.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BC5CA6A.EXE |
Source: cpcs.exe, 00000009.00000003.2543791751.000000000DC90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\user\LOCAL SETTINGS\APPLICATION DATA\AVG\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srengldr.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgas.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALERTMAN.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsSvc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000009734000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PWHITE=%PROGRAMFILES%\BitDefender\BitDefender 2013\bdagent.exe |
Source: cpcs.exe, 00000009.00000003.2528855901.000000000A101000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bdagent.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ABREGMON.EXE.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kasmain.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qoeloader.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CFGMNG32.EXE |
Source: cpcs.exe, 00000009.00000003.2545740501.000000000E112000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\user\APPDATA\LOCAL\TEMP\PROCMON.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdss.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\umxpol.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALMON.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avengine.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxetray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procdump.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.MultipleAV, %USERROOT%\Templates\avg\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fameh32.exe |
Source: cpcs.exe, 00000009.00000003.2533161271.000000000A44A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: virusutilities.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvxp.kxp |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLAMWIN.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALSVC.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fpwin.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\makereport.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CATEYE.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fprottray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %APPDATA%\Microsoft\Virus.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SuperKiller.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AYSERVICENT.AYE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32st.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsmon.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %APPDATA%\Microsoft\Defender\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ollydbg.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fnrb32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkservice.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avenger.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, %MYDOCS%\System\msascui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVKTUNERSERVICE.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfp.exe |
Source: cpcs.exe, 00000009.00000003.2529734518.000000000A248000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AVP.EXE |
Source: cpcs.exe, 00000009.00000003.2545740501.000000000E112000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\DEFAULT\APPDATA\LOCAL\TEMP\PROCMON.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fast.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webproxy.exe |
Source: cpcs.exe, 00000009.00000003.2544527727.000000000D66D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\NETWORKSERVICE\APPDATA\ROAMING\AVG\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Downloader, HKCU\Software\Microsoft\Windows\CurrentVersion\Run|unlockerassistant=*data*\unlocker\unlockerassistant.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ARCABIT.CORE.LOGGINGSERVICE.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcupdate.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.MultipleAV, %TEMP%\avg\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2533389394.000000000A54E000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529734518.000000000A217000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2532883037.000000000A53D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCTRAY.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe |
Source: cpcs.exe, 00000009.00000003.2545034326.000000000E01A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\APPDATA\LOCAL\TEMP\PROCMON.EXE |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 360Safe.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot95.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Agent, HKCR\Applications\360tray.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashmaisv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGAMSVR.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent.DC, %APPDATA%\SYSTEM\kwatch.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sfctlcom.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.Agent, %PROGRAMFILES%\SYSTEM\virus.exe |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: avgnt.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfw32.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\acais.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravtask.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APT.EXE |
Source: cpcs.exe, 00000009.00000003.2534960911.000000000A621000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2533161271.000000000A493000.00000004.00000020.00020000.00000000.sdmp, cpcs.exe, 00000009.00000003.2528855901.000000000A14E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: mbam.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fpavserver.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arcavir.exe |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: **\NOD32.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upschd.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CF9409.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\COMBOFIX.COM |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Small, %MYDOCS%\360Safe.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CMAIN.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVKWCTL.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGARKT.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\emlproui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530wtbyb.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpfw.exe |
Source: cpcs.exe, 00000009.00000003.2546826441.000000000D614000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\NETWORKSERVICE\APPDATA\LOCAL\TEMP\AVP.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswupdsv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CAPFASEM.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Trojan.Backdoor, %SYSDIR%\Sys32\cmdagent.exe |
Source: cpcs.exe, 00000009.00000003.2529231058.0000000009F11000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: avguard.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fprot.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spidernt.exe |
Source: cpcs.exe, 00000009.00000003.2545034326.000000000DFB4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\USERS\user\TEMPLATES\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ARCABIT.CORE.CONFIGURATOR2.EXE |
Source: cpcs.exe, 00000009.00000003.2546561141.000000000BF7E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\LOCAL SETTINGS\APPLICATION DATA\MICROSOFT\WINDOWS DEFENDER\MSASCUI.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tpsrv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardxservice.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regmon.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ulibcfg.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\umxfwhlp.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portmonitor.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\umxagent.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVKTRAY.EXE |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2service.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\emlproxy.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavprsrv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Security.Hijack, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashserv.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Rogue.MultipleAV, %USERROOT%\Local Settings\Application Data\avG\MSASCui.exe |
Source: cpcs.exe, 00000009.00000003.2556561426.0000000008334000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXTRA=Backdoor.PoisonIvy, %TEMP%\ixp000.tmp\123.exe |