Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2574587812.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638130851.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2637834053.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621365178.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2434060318.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451976324.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2545579864.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2578496500.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2434245748.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621022192.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638714621.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419181054.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082D2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2574587812.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638130851.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2637834053.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621365178.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2434060318.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451976324.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2545579864.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2578496500.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2434245748.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621022192.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638714621.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419181054.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082D2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0# |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://e5.i.lencr.org/0A |
Source: IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://e5.o.lencr.org0 |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: IV_Ultra.exe, 0000000C.00000003.2543646050.00000000082DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.dig |
Source: IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2574587812.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638130851.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2637834053.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621365178.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2434060318.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451976324.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2545579864.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2578496500.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2434245748.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621022192.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638714621.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419181054.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082D2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0L |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0O |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://s1.symcb.com/pca3-g5.crl0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://s2.symcb.com0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcb.com/sv.crl0a |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcb.com/sv.crt0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcd.com0& |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.???.xx/?search=%s |
Source: IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0 |
Source: IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.flexerasoftware.com0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009BB2000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A07C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F35000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.0000000002663000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009D92000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.info-zip.org/ |
Source: IV_Ultra.exe, 0000000C.00000003.2450408072.000000000822C000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418032809.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2543068719.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2467547118.000000000822C000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432952118.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft. |
Source: IV_Ultra.exe, 0000000C.00000003.2450408072.000000000822C000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418032809.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2543068719.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2467547118.000000000822C000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432952118.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft.i |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.softwareok.com |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.com/?Download=Find.Same.Images.OK |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.softwareok.de |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.de/?Download=Find.Same.Images.OK |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History |
Source: IV_Ultra.exe, 0000000C.00000000.2059222937.00000001401F4000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0 |
Source: cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.surfok.de/ |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.symauth.com/cps0( |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.symauth.com/rpa00 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.vmware.com/0 |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.vmware.com/0/ |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://alekberg.net/privacy |
Source: IV_Ultra.exe, 0000000C.00000003.2421167454.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.cn/auth/cookie/silentpassport |
Source: IV_Ultra.exe, 0000000C.00000003.2455036190.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2403339499.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/MarketMismatchCoachMark.a03d30a2272eef7b7188.j |
Source: IV_Ultra.exe, 0000000C.00000003.2404374426.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/channel-data-connector.b857251407e592f709ce.js |
Source: IV_Ultra.exe, 0000000C.00000003.2434060318.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2397179491.00000000082BA000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/clarity.36f98ce6150787681ef0.js |
Source: IV_Ultra.exe, 0000000C.00000003.2434060318.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2397179491.00000000082BA000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/clarity.36f98ce6150787681ef0.js.47ef7b7188.jsa |
Source: IV_Ultra.exe, 0000000C.00000003.2437717520.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2438803742.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/common-feed-libs.12b30f1ad55deb148a9a.js |
Source: IV_Ultra.exe, 0000000C.00000003.2437717520.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2438803742.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/common-feed-libs.12b30f1ad55deb148a9a.js984&w= |
Source: IV_Ultra.exe, 0000000C.00000003.2543646050.00000000082DC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418032809.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432952118.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/common-settings-edgenext.a92053920d965765ecb6. |
Source: IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418032809.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/common.ccf37a049089f68490a9.js |
Source: IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/common.ccf37a049089f68490a9.js5.47a.jsa |
Source: IV_Ultra.exe, 0000000C.00000003.2418032809.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/common.ccf37a049089f68490a9.js7979c81063b95eee |
Source: IV_Ultra.exe, 0000000C.00000003.2543434750.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2421102538.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2404374426.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437094452.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455646406.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/cs-core-desktop_card-components_dist_card-bann |
Source: IV_Ultra.exe, 0000000C.00000003.2420744262.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2450827417.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432952118.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/digest-card.85cfeee6ee4d102a4b71.js |
Source: IV_Ultra.exe, 0000000C.00000003.2436565939.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2450827417.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455036190.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432952118.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/experience.3fa26ba080d24cc97170.js |
Source: IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/experiences_top-sites-edgenext-wc_dist_TopSite |
Source: IV_Ultra.exe, 0000000C.00000003.2436237391.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2402960823.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/feedback.6a9b58a02a317bcb2465.js |
Source: IV_Ultra.exe, 0000000C.00000003.2454644710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436237391.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/feedback.6a9b58a02a317bcb2465.js892&w=0 |
Source: IV_Ultra.exe, 0000000C.00000003.2454644710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420591440.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436237391.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2402960823.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/feedback.6a9b58a02a317bcb2465.jssion |
Source: IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401786246.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/libs_location-service_dist_AutoSuggestService_ |
Source: IV_Ultra.exe, 0000000C.00000003.2455646406.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/libs_topics-shared-state_dist_TopicData_connec |
Source: IV_Ultra.exe, 0000000C.00000003.2432952118.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/microsoft.4fa8815283fe3d88a934.jsicData_connec |
Source: IV_Ultra.exe, 0000000C.00000003.2434060318.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2454644710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436237391.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437094452.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/money-info-service.b867bae147464f8d8a02.js |
Source: IV_Ultra.exe, 0000000C.00000003.2434060318.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437094452.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/money-info-service.b867bae147464f8d8a02.jsa |
Source: IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/nas-highlight-v3v4.38a4f083c7c7607ccda4.js |
Source: IV_Ultra.exe, 0000000C.00000003.2450827417.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/nas-highlight-v3v4.38a4f083c7c7607ccda4.js240a |
Source: IV_Ultra.exe, 0000000C.00000003.2450827417.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/nas-highlight-v3v4.38a4f083c7c7607ccda4.jsa |
Source: IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/nativeadstemplates.0610aec23b25fd495dd1.js |
Source: IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/nativeadstemplates.0610aec23b25fd495dd1.jsa |
Source: IV_Ultra.exe, 0000000C.00000003.2543434750.0000000002EB0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/nurturing-placement-manager.852a662b8fe0e45847 |
Source: IV_Ultra.exe, 0000000C.00000003.2436565939.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420744262.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455036190.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2403339499.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/ocvFeedback.c7b366c72ae6ca3a3d87.js |
Source: IV_Ultra.exe, 0000000C.00000003.2436565939.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420744262.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455036190.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2403339499.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/ocvFeedback.c7b366c72ae6ca3a3d87.jsa |
Source: IV_Ultra.exe, 0000000C.00000003.2436565939.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420744262.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455036190.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2403339499.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/super-nav.0559bdf8ce6c05205c5b.js |
Source: IV_Ultra.exe, 0000000C.00000003.2436565939.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420744262.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455036190.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2403339499.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/super-nav.0559bdf8ce6c05205c5b.jsa |
Source: IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/service/news/feed/pages/weblayout?User=m-02516264065666BA1AF177C107DC6729&act |
Source: IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/service/segments/recoitems/weather?apikey=UhJ4G66OjyLbn9mXARgajXLiLw6V75sHnfp |
Source: IV_Ultra.exe, 0000000C.00000003.2404374426.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/taskbar_v10/Condition_Card/MostlySunnyD |
Source: IV_Ultra.exe, 0000000C.00000003.2543434750.0000000002EB0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://azureedge.net |
Source: IV_Ultra.exe, 0000000C.00000003.2402960823.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419378543.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-strea |
Source: IV_Ultra.exe, 0000000C.00000003.2454644710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420591440.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436237391.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://bzib.nelreports.net/api/report?cat=bingbusiness |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: IV_Ultra.exe, 0000000C.00000003.2434416031.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://chrome.cloudflare-dns.com |
Source: IV_Ultra.exe, 0000000C.00000003.2434416031.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://chrome.cloudflare-dns.com9 |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://chromium.dns.nextdns.io |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://chromium.dns.nextdns.iohttps://nextdns.io/privacyr |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://d.symcb.com/cps0% |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://d.symcb.com/rpa0 |
Source: IV_Ultra.exe, 0000000C.00000003.2404053241.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455341689.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420921016.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436753734.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report&0 |
Source: IV_Ultra.exe, 0000000C.00000003.2455097130.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: IV_Ultra.exe, 0000000C.00000003.2455341689.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420921016.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436753734.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn.net |
Source: IV_Ultra.exe, 0000000C.00000003.2434416031.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn0 |
Source: IV_Ultra.exe, 0000000C.00000003.2455341689.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420921016.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436753734.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msna |
Source: IV_Ultra.exe, 0000000C.00000003.2455341689.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420921016.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436753734.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msnom |
Source: IV_Ultra.exe, 0000000C.00000003.2455341689.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420921016.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436753734.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/reportcat=msn |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455341689.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420921016.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2436753734.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/reportionS |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations/ |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations/ |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: IV_Ultra.exe, 0000000C.00000003.2418498059.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2433574540.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451123109.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://developers.google.com/speed/public-dns/privacy |
Source: IV_Ultra.exe, 0000000C.00000003.2418498059.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2433574540.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451123109.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://developers.google.com/speed/public-dns/privacyquery |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dns.levonet.sk/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dns.quad9.net/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dns.sb/privacy/ |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dns.sb/privacy/Char |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dns10.quad9.net/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dns11.quad9.net/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh-01.spectrum.com/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh-02.spectrum.com/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2451123109.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh.cleanbrowsing.org/doh/adult-filter |
Source: IV_Ultra.exe, 0000000C.00000003.2451123109.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh.cleanbrowsing.org/doh/family-filter |
Source: IV_Ultra.exe, 0000000C.00000003.2451123109.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh.cleanbrowsing.org/doh/security-filter |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh.cox.net/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2451123109.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh.familyshield.opendns.com/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh.opendns.com/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://doh.quickline.ch/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=Arbit |
Source: IV_Ultra.exe, 0000000C.00000003.2419378543.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_edrop_maximal_light.png/1.1.12/asset |
Source: IV_Ultra.exe, 0000000C.00000003.2543731160.0000000002EB1000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2543434750.0000000002EB0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light.png/1.7.1/asset |
Source: IV_Ultra.exe, 0000000C.00000003.2543731160.0000000002EB1000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2543434750.0000000002EB0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light.png/1.7.1/asset4B |
Source: IV_Ultra.exe, 0000000C.00000003.2404374426.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2397179491.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_light.png/1.4.0/asset |
Source: IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA11MSkH |
Source: IV_Ultra.exe, 0000000C.00000003.2543646050.00000000082DC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA13Q6AL |
Source: IV_Ultra.exe, 0000000C.00000003.2543646050.00000000082DC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA13Q6ALLast-Modified: |
Source: IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA1tU84U |
Source: IV_Ultra.exe, 0000000C.00000003.2574587812.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008248000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638130851.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2637834053.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621365178.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2545579864.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2406073178.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2578496500.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2450408072.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621022192.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638714621.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA1u24yb |
Source: IV_Ultra.exe, 0000000C.00000003.2574587812.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008248000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638130851.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2637834053.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621365178.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2545579864.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2406073178.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2578496500.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2450408072.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621022192.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638714621.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA1u24ybX-Source-Length: |
Source: IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008248000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA1xc9H0 |
Source: IV_Ultra.exe, 0000000C.00000003.2467547118.0000000008248000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437432309.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AA1xc9H0Last-Modified: |
Source: IV_Ultra.exe, 0000000C.00000003.2543646050.00000000082DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAc9vHK |
Source: IV_Ultra.exe, 0000000C.00000003.2543646050.00000000082DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAc9vHKLast-Modified: |
Source: IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAdTRDX |
Source: IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAdTRDX) |
Source: IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/BB1msDBP |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/ |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/Char |
Source: IV_Ultra.exe, 0000000C.00000003.2434416031.0000000008233000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419378543.0000000008233000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2402078229.0000000008233000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452309391.0000000008233000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.microsoftonline.com/ |
Source: IV_Ultra.exe, 0000000C.00000003.2543434750.0000000002EB0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://msn.com |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://nextdns.io/privacy |
Source: IV_Ultra.exe, 0000000C.00000003.2405454138.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2540111710.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2402960823.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn. |
Source: IV_Ultra.exe, 0000000C.00000003.2455097130.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com |
Source: IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2437717520.00000000082AD000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2467547118.000000000822C000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2404053241.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420788827.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082BE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432952118.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419181054.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2454172947.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2432795954.0000000008221000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420057701.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419378543.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2438803742.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2418963495.00000000082D2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/ |
Source: IV_Ultra.exe, 0000000C.00000003.2402960823.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2403622318.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420357849.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420057701.00000000082D2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/e6 |
Source: IV_Ultra.exe, 0000000C.00000003.2437717520.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2438803742.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/edge/ntp/service-worker.js?bundles=latest&riverAgeMinutes=2880&navAgeMinutes=288 |
Source: IV_Ultra.exe, 0000000C.00000003.2451717585.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New |
Source: IV_Ultra.exe, 0000000C.00000003.2438803742.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&start |
Source: IV_Ultra.exe, 0000000C.00000003.2454172947.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.comAccess-Control-Expose-Headers: |
Source: IV_Ultra.exe, 0000000C.00000003.2574587812.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638130851.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2637834053.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621365178.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2545579864.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2578496500.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621022192.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2638714621.0000000008265000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2636250425.0000000008265000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.comcache-control:public |
Source: IV_Ultra.exe, 0000000C.00000003.2454172947.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2420057701.00000000082D2000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2455097130.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.comreport-to: |
Source: IV_Ultra.exe, 0000000C.00000003.2406073178.00000000082D3000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2405637375.00000000082D2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.comx-as-suppresssetcookie:1cache-control:private |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://odvr.nic.cz/doh |
Source: IV_Ultra.exe, 0000000C.00000003.2434416031.0000000008233000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419378543.0000000008233000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2402078229.0000000008233000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452309391.0000000008233000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://permanently-removed.invalid/ |
Source: IV_Ultra.exe, 0000000C.00000003.2225598788.0000000000687000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/ |
Source: IV_Ultra.exe, 0000000C.00000003.2637282358.0000000002E0E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2226222196.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266219496.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/Albany-Texas.html?khoyg1efvd=9eVg8xh2FdMx6aJnqa1n0a3Vyj0pHE9BafML582Q6TZmj6J |
Source: IV_Ultra.exe, 0000000C.00000003.2216493328.0000000000687000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2273516634.0000000000687000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2273048658.0000000000687000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2225598788.0000000000687000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/G4ad |
Source: IV_Ultra.exe, 0000000C.00000003.2214561637.0000000000687000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/c4Ed |
Source: IV_Ultra.exe, 0000000C.00000003.2214561637.0000000000687000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/g4Ad |
Source: IV_Ultra.exe, 0000000C.00000003.2611750364.0000000008161000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online:443 |
Source: IV_Ultra.exe, 0000000C.00000003.2225887214.0000000000634000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2214561637.0000000000642000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2216493328.0000000000634000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2206036240.0000000000633000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2273516634.0000000000634000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2214561637.000000000062D000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2273048658.000000000062D000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2206550435.0000000000634000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2225598788.000000000062D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online:443/Albany-Texas.html?khoyg1efvd=9eVg8xh2FdMx6aJnqa1n0a3Vyj0pHE9BafML582Q6TZ |
Source: IV_Ultra.exe, 0000000C.00000003.2633650238.0000000008165000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2635554988.0000000008167000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online:443; |
Source: IV_Ultra.exe, 0000000C.00000003.2650655567.0000000008167000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online:443x |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://public.dns.iij.jp/ |
Source: IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://public.dns.iij.jp/dns-query |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://public.dns.iij.jp/r |
Source: IV_Ultra.exe, 0000000C.00000003.2421167454.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://res.cdn.office.net/ |
Source: SplashWin.exe, 00000002.00000003.1778650852.0000000000912000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.0000000008791000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008ABA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://sectigo.com/CPS0 |
Source: IV_Ultra.exe, 0000000C.00000003.2543646050.00000000082DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://sn.com |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.0000000008817000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.000000000881E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.000000000881E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF |
Source: IV_Ultra.exe, 0000000C.00000003.2267906093.00000000082C9000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: IV_Ultra.exe, 0000000C.00000003.2267906093.00000000082A6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: IV_Ultra.exe, 0000000C.00000003.2267906093.00000000082C9000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: IV_Ultra.exe, 0000000C.00000003.2267906093.00000000082A6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://t.ssl.ak.dynamic.tiles.virtualearth.net |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://titlehub.xboxlive.com/users/ |
Source: IV_Ultra.exe, 0000000C.00000003.2225598788.0000000000687000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://undermymindops.com/ |
Source: IV_Ultra.exe, 0000000C.00000003.2273516634.0000000000687000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2273048658.0000000000687000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2225598788.0000000000687000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://undermymindops.com//5 |
Source: IV_Ultra.exe, 0000000C.00000003.2266219496.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://undermymindops.com/SLAGGGLX.msi |
Source: IV_Ultra.exe, 0000000C.00000003.2267625171.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2227888367.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228486555.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2226365274.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2268975199.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2231675654.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2237200362.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266951516.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2231539486.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2269600707.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2270101370.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2226222196.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266219496.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://undermymindops.com/SLAGGGLX.msiC |
Source: IV_Ultra.exe, 0000000C.00000003.2267625171.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2227888367.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228486555.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2226365274.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2268975199.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2231675654.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2237200362.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266951516.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2231539486.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2269600707.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2270101370.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2226222196.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266219496.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://undermymindops.com/SLAGGGLX.msiChrome/119.0.0.0 |
Source: IV_Ultra.exe, 0000000C.00000002.2660941467.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2543924028.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2267625171.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2227888367.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2337415129.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228486555.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2226365274.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2621684023.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2335509638.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2330277760.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2268975199.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2231675654.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2394967360.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2237200362.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266951516.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2231539486.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2575125476.0000000002E4F000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2269600707.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2270101370.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2325322898.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2343088328.0000000002E4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://undermymindops.com/SLAGGGLX.msic |
Source: IV_Ultra.exe, 0000000C.00000003.2273516634.0000000000687000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2273048658.0000000000687000.00000004.00000020.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2225598788.0000000000687000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://undermymindops.com/SLAGGGLX.msiihgiflha)8 |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://user.auth.xboxlive.com/user/authenticate |
Source: IV_Ultra.exe, 0000000C.00000003.2418498059.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2433574540.0000000002E78000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2451123109.0000000002E78000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.cisco.com/c/en/us/about/legal/privacy-full.html |
Source: IV_Ultra.exe, 0000000C.00000003.2404053241.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.clarity.ms |
Source: SplashWin.exe, 00000002.00000002.1791930552.0000000009C08000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000003.00000002.1854031546.000000000A0D2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2101160427.0000000004F7E000.00000004.00000800.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2230878062.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2279133019.00000000084A9000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2256467982.0000000008796000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2228669585.00000000082AB000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2234749334.00000000084B0000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2241874081.00000000085BC000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000002.2659999868.00000000026AC000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.2139443882.0000000009DE8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.2365541260.0000000004BFE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: IV_Ultra.exe, 0000000C.00000003.2265845865.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2266399722.0000000002EAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: IV_Ultra.exe, 0000000C.00000003.2421167454.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.microsoftstart.com |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.0000000008817000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.000000000881E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.000000000881E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.000000000881E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.000000000881E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: IV_Ultra.exe, 0000000C.00000003.2579220782.000000000881E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: IV_Ultra.exe, 0000000C.00000003.2421167454.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.cn |
Source: IV_Ultra.exe, 0000000C.00000003.2421167454.00000000082D3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.nic.cz/odvr/ |
Source: IV_Ultra.exe, 0000000C.00000003.2468582660.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2376332129.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.nic.cz/odvr/har |
Source: IV_Ultra.exe, 0000000C.00000003.2434621710.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2452733933.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2419588289.00000000082A4000.00000004.00000001.00020000.00000000.sdmp, IV_Ultra.exe, 0000000C.00000003.2401458020.00000000082A4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.quad9.net/home/privacy/ |
Source: IV_Ultra.exe, 0000000C.00000003.2404616162.00000000082AF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xsts.auth.xboxlive.com/xsts/authorize |
Source: C:\Windows\System32\msiexec.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: srpapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: tsappcmp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msihnd.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: pcacli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: tsappcmp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: srclient.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: pcacli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: duilib_u.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: pla.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: tdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Ovum\SplashWin.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: duilib_u.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: pla.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: tdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: duilib_u.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: pla.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: tdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\HostPower_debug\SplashWin.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\IV_Ultra.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: aclayers.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc_os.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msi.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: srpapi.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: tsappcmp.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: textinputframework.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: textshaping.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netapi32.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wkscli.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msihnd.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: dwmapi.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: pcacli.dll | |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: aclayers.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc_os.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: msi.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wininet.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: profapi.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: riched32.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: riched20.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: usp10.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: msls31.dll | |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\{4DE40933-26C7-4A77-A2A0-AD0C410AD9C1}\ISBEW64.exe | Section loaded: sxs.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: duilib_u.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: vcruntime140.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: msvcp140.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: vcruntime140.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: dbghelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: pla.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: pdh.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: tdh.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: cabinet.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: wevtapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: shdocvw.dll | |
Source: C:\Users\user\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: propsys.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: profapi.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: linkinfo.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntshrui.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cscapi.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: bitsproxy.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: netutils.dll | |