Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
3_2_0040B335 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
3_2_0040B53A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
3_2_0041B63A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0044D7F9 FindFirstFileExA, |
3_2_0044D7F9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
3_2_004089A9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00406AC2 FindFirstFileW,FindNextFileW, |
3_2_00406AC2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
3_2_00407A8C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
3_2_00408DA7 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW, |
3_2_00418E5F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, |
3_2_100010F1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_10006580 FindFirstFileExA, |
3_2_10006580 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0040B477 FindFirstFileW,FindNextFileW, |
6_2_0040B477 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen, |
8_2_00407EF8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen, |
9_2_00407898 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.223.3.167 |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1476027682.0000000002C21000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://91.223.3.167 |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
String found in binary or memory: http://91.223.3.167/cir/Pvxorwu.wav |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://c.pki.goog/r/gsr1.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://c.pki.goog/r/r4.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://c.pki.goog/we2/64OUIVzpZV4.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crt0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0? |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0F |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~ |
Source: InstallUtil.exe, InstallUtil.exe, 00000003.00000002.3747543577.0000000000AD7000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000003.00000002.3747753610.0000000000B22000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000003.00000002.3747753610.0000000000B12000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000003.00000002.3746761477.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://i.pki.goog/gsr1.crt0- |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://i.pki.goog/r4.crt0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://i.pki.goog/we2.crt0 |
Source: powershell.exe, 00000004.00000002.1590414746.00000000054ED000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://o.pki.goog/we20% |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocsp.digicert.com0O |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocsp.msocsp.com0S |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://ocspx.digicert.com0E |
Source: powershell.exe, 00000004.00000002.1582955867.00000000045D5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1593571792.0000000006F75000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1476027682.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1582955867.0000000004481000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000004.00000002.1582955867.00000000045D5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1593571792.0000000006F75000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: InstallUtil.exe, InstallUtil.exe, 00000009.00000002.1506345264.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.ebuddy.com |
Source: InstallUtil.exe, InstallUtil.exe, 00000009.00000002.1506345264.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.imvu.com |
Source: InstallUtil.exe, 00000009.00000002.1506345264.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: InstallUtil.exe, 00000009.00000002.1506345264.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.imvu.comr |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696428304750 |
Source: InstallUtil.exe, 00000006.00000002.1513685110.0000000000EF4000.00000004.00000010.00020000.00000000.sdmp |
String found in binary or memory: http://www.nirsoft.net |
Source: InstallUtil.exe, 00000009.00000002.1506345264.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.nirsoft.net/ |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp |
Source: powershell.exe, 00000004.00000002.1582955867.0000000004481000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6lB |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX |
Source: powershell.exe, 00000004.00000002.1590414746.00000000054ED000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000004.00000002.1590414746.00000000054ED000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000004.00000002.1590414746.00000000054ED000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?77686a33b2eafa1538ef78c3be5a5910 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?caa2cf97cacae25a18f577703684ee65 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7e9591e308dbda599df1fc08720a72a3 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?c6a2869c584d2ea23c67c44abe1ec326 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json |
Source: powershell.exe, 00000004.00000002.1582955867.00000000045D5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1593571792.0000000006F75000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1514993699.0000000006180000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1514993699.0000000006180000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1514993699.0000000006180000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: powershell.exe, 00000004.00000002.1582955867.0000000004824000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://go.micro |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: InstallUtil.exe |
String found in binary or memory: https://login.yahoo.com/config/login |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://maps.windows.com/windows-app-web-link |
Source: powershell.exe, 00000004.00000002.1590414746.00000000054ED000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-04-14-10-35/PreSignInSettingsConfig.json |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=4954a0 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1514993699.0000000006180000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1476027682.0000000002C4E000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1514993699.0000000006180000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, 00000000.00000002.1514993699.0000000006180000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: InstallUtil.exe, InstallUtil.exe, 00000009.00000002.1506345264.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: https://www.google.com |
Source: InstallUtil.exe |
String found in binary or memory: https://www.google.com/accounts/servicelogin |
Source: bhv8FEB.tmp.6.dr |
String found in binary or memory: https://www.office.com/ |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, |
3_2_00415B5E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00409E39 EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, |
6_2_00409E39 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00409EA1 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, |
6_2_00409EA1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, |
8_2_00406DFC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, |
8_2_00406E9F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, |
9_2_004068B5 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, |
9_2_004072B5 |
Source: 3.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000000.00000002.1493124688.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000003.00000002.3746761477.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000003.00000002.3746761477.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000003.00000002.3746761477.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe PID: 8840, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: InstallUtil.exe PID: 9048, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067EAA70 NtResumeThread, |
0_2_067EAA70 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E6B78 NtProtectVirtualMemory, |
0_2_067E6B78 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067EAA69 NtResumeThread, |
0_2_067EAA69 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E6B70 NtProtectVirtualMemory, |
0_2_067E6B70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041742B GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError, |
3_2_0041742B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041AECC OpenProcess,NtSuspendProcess,CloseHandle, |
3_2_0041AECC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041AEF8 OpenProcess,NtResumeProcess,CloseHandle, |
3_2_0041AEF8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle, |
6_2_0040BAE3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_004016FD NtdllDefWindowProc_A, |
8_2_004016FD |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_004017B7 NtdllDefWindowProc_A, |
8_2_004017B7 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00402CAC NtdllDefWindowProc_A, |
9_2_00402CAC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00402D66 NtdllDefWindowProc_A, |
9_2_00402D66 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_02ACE418 |
0_2_02ACE418 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_02ACF6F0 |
0_2_02ACF6F0 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_02ACA720 |
0_2_02ACA720 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_02ACA730 |
0_2_02ACA730 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_02ACACC8 |
0_2_02ACACC8 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E35F8 |
0_2_067E35F8 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E5C20 |
0_2_067E5C20 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E35E8 |
0_2_067E35E8 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E5C10 |
0_2_067E5C10 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_0694FA78 |
0_2_0694FA78 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_0694E490 |
0_2_0694E490 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_06930006 |
0_2_06930006 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_06930040 |
0_2_06930040 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_0694E9A8 |
0_2_0694E9A8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0043D04B |
3_2_0043D04B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0042707E |
3_2_0042707E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041301D |
3_2_0041301D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00441030 |
3_2_00441030 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00453110 |
3_2_00453110 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004271B8 |
3_2_004271B8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041D27C |
3_2_0041D27C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004522E2 |
3_2_004522E2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0043D2A8 |
3_2_0043D2A8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00437360 |
3_2_00437360 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004363BA |
3_2_004363BA |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0042645F |
3_2_0042645F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00431582 |
3_2_00431582 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0043672C |
3_2_0043672C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041E7EA |
3_2_0041E7EA |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0044C949 |
3_2_0044C949 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004269D6 |
3_2_004269D6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004369D6 |
3_2_004369D6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0043CBED |
3_2_0043CBED |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00432C54 |
3_2_00432C54 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00436C9D |
3_2_00436C9D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0043CE1C |
3_2_0043CE1C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00436F58 |
3_2_00436F58 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00434F32 |
3_2_00434F32 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_10017194 |
3_2_10017194 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_1000B5C1 |
3_2_1000B5C1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044A030 |
6_2_0044A030 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0040612B |
6_2_0040612B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0043E13D |
6_2_0043E13D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044B188 |
6_2_0044B188 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00442273 |
6_2_00442273 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044D380 |
6_2_0044D380 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044A5F0 |
6_2_0044A5F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_004125F6 |
6_2_004125F6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_004065BF |
6_2_004065BF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_004086CB |
6_2_004086CB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_004066BC |
6_2_004066BC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044D760 |
6_2_0044D760 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00405A40 |
6_2_00405A40 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00449A40 |
6_2_00449A40 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00405AB1 |
6_2_00405AB1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00405B22 |
6_2_00405B22 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044ABC0 |
6_2_0044ABC0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00405BB3 |
6_2_00405BB3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00417C60 |
6_2_00417C60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044CC70 |
6_2_0044CC70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00418CC9 |
6_2_00418CC9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044CDFB |
6_2_0044CDFB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044CDA0 |
6_2_0044CDA0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044AE20 |
6_2_0044AE20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00415E3E |
6_2_00415E3E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00437F3B |
6_2_00437F3B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00405038 |
8_2_00405038 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0041208C |
8_2_0041208C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_004050A9 |
8_2_004050A9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0040511A |
8_2_0040511A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0043C13A |
8_2_0043C13A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_004051AB |
8_2_004051AB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00449300 |
8_2_00449300 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0040D322 |
8_2_0040D322 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0044A4F0 |
8_2_0044A4F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0043A5AB |
8_2_0043A5AB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00413631 |
8_2_00413631 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00446690 |
8_2_00446690 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0044A730 |
8_2_0044A730 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_004398D8 |
8_2_004398D8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_004498E0 |
8_2_004498E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0044A886 |
8_2_0044A886 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0043DA09 |
8_2_0043DA09 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00438D5E |
8_2_00438D5E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00449ED0 |
8_2_00449ED0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0041FE83 |
8_2_0041FE83 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00430F54 |
8_2_00430F54 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_004050C2 |
9_2_004050C2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_004014AB |
9_2_004014AB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00405133 |
9_2_00405133 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_004051A4 |
9_2_004051A4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00401246 |
9_2_00401246 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_0040CA46 |
9_2_0040CA46 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00405235 |
9_2_00405235 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_004032C8 |
9_2_004032C8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00401689 |
9_2_00401689 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00402F60 |
9_2_00402F60 |
Source: 3.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.3c73988.1.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.1493124688.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000000.00000002.1493124688.0000000003D30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000003.00000002.3746761477.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000003.00000002.3746761477.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000003.00000002.3746761477.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe PID: 8840, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: InstallUtil.exe PID: 9048, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, Task.cs |
Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, TaskPrincipal.cs |
Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, TaskSecurity.cs |
Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, TaskSecurity.cs |
Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, Task.cs |
Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, TaskSecurity.cs |
Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, TaskSecurity.cs |
Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, TaskPrincipal.cs |
Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, TaskFolder.cs |
Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, User.cs |
Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, TaskPrincipal.cs |
Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, User.cs |
Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, TaskSecurity.cs |
Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, TaskSecurity.cs |
Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, Task.cs |
Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, TaskFolder.cs |
Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, TaskFolder.cs |
Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, User.cs |
Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: InstallUtil.exe, InstallUtil.exe, 00000006.00000002.1513148426.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: InstallUtil.exe, InstallUtil.exe, 00000008.00000002.1506892880.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: InstallUtil.exe, 00000006.00000002.1513148426.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: InstallUtil.exe, InstallUtil.exe, 00000006.00000002.1513148426.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: InstallUtil.exe, InstallUtil.exe, 00000006.00000002.1513148426.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: InstallUtil.exe, InstallUtil.exe, 00000006.00000002.1513148426.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: InstallUtil.exe, 00000006.00000002.1514558399.0000000001310000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: InstallUtil.exe, InstallUtil.exe, 00000006.00000002.1513148426.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: unknown |
Process created: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe "C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe" |
|
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" |
|
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe' -Force |
|
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\wwygbptuchcdfblksmaltqitnujxaycgq" |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\yyezc" |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\yyezc" |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\isrjdappm" |
|
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe' -Force |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\wwygbptuchcdfblksmaltqitnujxaycgq" |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\yyezc" |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\yyezc" |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\isrjdappm" |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: pstorec.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: vaultcli.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: pstorec.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe, Rlwjjjxx.cs |
.Net Code: Clrrna System.AppDomain.Load(byte[]) |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, ReflectionHelper.cs |
.Net Code: InvokeMethod |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, ReflectionHelper.cs |
.Net Code: InvokeMethod |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40957c0.0.raw.unpack, XmlSerializationHelper.cs |
.Net Code: ReadObjectProperties |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, ReflectionHelper.cs |
.Net Code: InvokeMethod |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, ReflectionHelper.cs |
.Net Code: InvokeMethod |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.40457a0.2.raw.unpack, XmlSerializationHelper.cs |
.Net Code: ReadObjectProperties |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6180000.6.raw.unpack, TypeModel.cs |
.Net Code: TryDeserializeList |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6180000.6.raw.unpack, ListDecorator.cs |
.Net Code: Read |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6180000.6.raw.unpack, TypeSerializer.cs |
.Net Code: CreateInstance |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6180000.6.raw.unpack, TypeSerializer.cs |
.Net Code: EmitCreateInstance |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6180000.6.raw.unpack, TypeSerializer.cs |
.Net Code: EmitCreateIfNull |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, ReflectionHelper.cs |
.Net Code: InvokeMethod |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, ReflectionHelper.cs |
.Net Code: InvokeMethod |
Source: 0.2.OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.6780000.7.raw.unpack, XmlSerializationHelper.cs |
.Net Code: ReadObjectProperties |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E17B9 push es; retf |
0_2_067E17BC |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Code function: 0_2_067E2449 push es; retf |
0_2_067E2490 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004560BF push ecx; ret |
3_2_004560D2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00434206 push ecx; ret |
3_2_00434219 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0045E669 push ecx; ret |
3_2_0045E67B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0045C9DD push esi; ret |
3_2_0045C9E6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004569F0 push eax; ret |
3_2_00456A0E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_10002806 push ecx; ret |
3_2_10002819 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00446B75 push ecx; ret |
6_2_00446B85 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_00452BB4 push eax; ret |
6_2_00452BC1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044DDB0 push eax; ret |
6_2_0044DDC4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0044DDB0 push eax; ret |
6_2_0044DDEC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0044B090 push eax; ret |
8_2_0044B0A4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_0044B090 push eax; ret |
8_2_0044B0CC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00451D34 push eax; ret |
8_2_00451D41 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00444E71 push ecx; ret |
8_2_00444E81 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00414060 push eax; ret |
9_2_00414074 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00414060 push eax; ret |
9_2_0041409C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00414039 push ecx; ret |
9_2_00414049 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_004164EB push 0000006Ah; retf |
9_2_004165C4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00416553 push 0000006Ah; retf |
9_2_004165C4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00416555 push 0000006Ah; retf |
9_2_004165C4 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
3_2_0040B335 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
3_2_0040B53A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
3_2_0041B63A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_0044D7F9 FindFirstFileExA, |
3_2_0044D7F9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
3_2_004089A9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00406AC2 FindFirstFileW,FindNextFileW, |
3_2_00406AC2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
3_2_00407A8C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
3_2_00408DA7 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW, |
3_2_00418E5F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, |
3_2_100010F1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 3_2_10006580 FindFirstFileExA, |
3_2_10006580 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 6_2_0040B477 FindFirstFileW,FindNextFileW, |
6_2_0040B477 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 8_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen, |
8_2_00407EF8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Code function: 9_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen, |
9_2_00407898 |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Queries volume information: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |