Source: unknown | TCP traffic detected without corresponding DNS query: 104.42.151.234 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 104.79.89.181 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 84.53.167.113 |
Source: unknown | TCP traffic detected without corresponding DNS query: 84.53.167.113 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 40.67.254.36 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 40.67.254.36 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.200 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.200 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 104.79.89.181 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 93.184.220.29 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.190.129.133 |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://fontfabrik.com |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.259984630.0000000002D51000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.fonts.com |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.tiro.com |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.typography.netD |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: explorer.exe, 00000003.00000000.275549675.000000000BC36000.00000002.00000001.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: 00000001.00000002.289490288.00000000011C0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000002.289490288.00000000011C0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000006.00000002.521320039.0000000000660000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000006.00000002.521320039.0000000000660000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000002.260425222.0000000003D51000.00000004.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000000.00000002.260425222.0000000003D51000.00000004.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000006.00000002.521773301.0000000000950000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000006.00000002.521773301.0000000000950000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000002.289472822.0000000001190000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000002.289472822.0000000001190000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000002.289268123.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000002.289268123.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000006.00000002.521861519.0000000000980000.00000004.00000001.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000006.00000002.521861519.0000000000980000.00000004.00000001.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 1.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 1.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00417BA0 NtCreateFile, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00417C50 NtReadFile, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00417CD0 NtClose, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00417D80 NtAllocateVirtualMemory, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00417C4C NtReadFile, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00417CCA NtClose, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529910 NtAdjustPrivilegesToken,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015299A0 NtCreateSection,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529840 NtDelayExecution,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529860 NtQuerySystemInformation,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015298F0 NtReadVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529A50 NtCreateFile,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529A00 NtProtectVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529A20 NtResumeThread,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529540 NtReadFile,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015295D0 NtClose,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529710 NtQueryInformationToken,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529FE0 NtCreateMutant,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529780 NtMapViewOfSection,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015297A0 NtUnmapViewOfSection,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529660 NtAllocateVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015296E0 NtFreeVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529950 NtQueueApcThread, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015299D0 NtCreateProcessEx, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0152B040 NtSuspendThread, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529820 NtEnumerateKey, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015298A0 NtWriteVirtualMemory, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529B00 NtSetValueKey, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0152A3B0 NtGetContextThread, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529A10 NtQuerySection, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529A80 NtOpenDirectoryObject, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529560 NtWriteFile, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0152AD30 NtSetContextThread, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529520 NtWaitForSingleObject, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015295F0 NtQueryInformationFile, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529770 NtSetInformationFile, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0152A770 NtOpenThread, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529760 NtOpenProcess, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0152A710 NtOpenProcessToken, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529730 NtQueryVirtualMemory, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529650 NtQueryValueKey, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529670 NtQueryInformationProcess, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01529610 NtEnumerateValueKey, |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015296D0 NtCreateKey, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048195D0 NtClose,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819540 NtReadFile,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048196D0 NtCreateKey,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048196E0 NtFreeVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819650 NtQueryValueKey,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819660 NtAllocateVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819780 NtMapViewOfSection,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819FE0 NtCreateMutant,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819710 NtQueryInformationToken,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819840 NtDelayExecution,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819860 NtQuerySystemInformation,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048199A0 NtCreateSection,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819910 NtAdjustPrivilegesToken,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819A50 NtCreateFile,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048195F0 NtQueryInformationFile, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819520 NtWaitForSingleObject, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0481AD30 NtSetContextThread, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819560 NtWriteFile, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819610 NtEnumerateValueKey, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819670 NtQueryInformationProcess, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048197A0 NtUnmapViewOfSection, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0481A710 NtOpenProcessToken, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819730 NtQueryVirtualMemory, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819760 NtOpenProcess, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0481A770 NtOpenThread, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819770 NtSetInformationFile, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048198A0 NtWriteVirtualMemory, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048198F0 NtReadVirtualMemory, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819820 NtEnumerateKey, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0481B040 NtSuspendThread, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048199D0 NtCreateProcessEx, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819950 NtQueueApcThread, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819A80 NtOpenDirectoryObject, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819A00 NtProtectVirtualMemory, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819A10 NtQuerySection, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819A20 NtResumeThread, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0481A3B0 NtGetContextThread, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04819B00 NtSetValueKey, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00677BA0 NtCreateFile, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00677C50 NtReadFile, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00677CD0 NtClose, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00677D80 NtAllocateVirtualMemory, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00677C4C NtReadFile, |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00677CCA NtClose, |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Code function: 0_2_0130EB70 |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Code function: 0_2_0130EB60 |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Code function: 0_2_0130CB5C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00401030 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041C16E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00408A40 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00408A3B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041C52F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00402D8A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00402D90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041BF03 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00402FB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014EF900 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01504120 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A1002 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0150A830 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015BE824 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B28EC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014FB090 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015120A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B20A8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0150AB40 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0150A309 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B2B28 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A03DA |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015ADBD2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0151ABD8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015923E3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0151EBB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0159FA2B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A4AEF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B22AE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B1D55 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B2D07 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014E0D20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B25DD |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014FD5E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01512581 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A2D82 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0150B477 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015AD466 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014F841F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A4496 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015BDFCE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B1FF1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015AD616 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01506E30 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B2EF7 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047E841F |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0489D466 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04802581 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A25DD |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047D0D20 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A2D07 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047ED5E0 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A1D55 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047F6E30 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A2EF7 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0489D616 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048ADFCE |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A1FF1 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048020A0 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A20A8 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047FA830 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A28EC |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_04891002 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048AE824 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047EB090 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047F4120 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047DF900 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047F99BF |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A22AE |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0488FA2B |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0480EBB0 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_047FAB40 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048903DA |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0489DBD2 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_048A2B28 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067C16E |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00668A40 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00668A3B |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067C52F |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00662D8A |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00662D90 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067BF03 |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00662FB0 |
Source: 00000001.00000002.289490288.00000000011C0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000002.289490288.00000000011C0000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000006.00000002.521320039.0000000000660000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000006.00000002.521320039.0000000000660000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000002.260425222.0000000003D51000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000000.00000002.260425222.0000000003D51000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000006.00000002.521773301.0000000000950000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000006.00000002.521773301.0000000000950000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000002.289472822.0000000001190000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000002.289472822.0000000001190000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000002.289268123.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000002.289268123.0000000000400000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000006.00000002.521861519.0000000000980000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000006.00000002.521861519.0000000000980000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 1.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 1.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Code function: 0_2_0130DF50 push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00415913 push edx; retf |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041AC62 push D8D19732h; iretd |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00414D57 push esi; retf |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041AD65 push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00414DEA push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041ADB2 push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041ADBB push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00414E7E push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0041AE1C push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_00414E24 push eax; ret |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0040FF92 push 00000033h; iretd |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0153D0D1 push ecx; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0482D0D1 push ecx; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00675913 push edx; retf |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067AC62 push D8D19732h; iretd |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067AD65 push eax; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00674D57 push esi; retf |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00674DEA push eax; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067ADB2 push eax; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067ADBB push eax; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00674E7E push eax; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_00674E24 push eax; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0067AE1C push eax; ret |
Source: C:\Windows\SysWOW64\raserver.exe | Code function: 6_2_0066FF92 push 00000033h; iretd |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\Purchase Order 40,7045$.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\raserver.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.260399670.000000000309F000.00000004.00000001.sdmp | Binary or memory string: VMware |
Source: explorer.exe, 00000003.00000000.274132486.0000000008270000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: explorer.exe, 00000003.00000000.274511209.000000000891C000.00000004.00000001.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.259984630.0000000002D51000.00000004.00000001.sdmp | Binary or memory string: vmware |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.259984630.0000000002D51000.00000004.00000001.sdmp | Binary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: explorer.exe, 00000003.00000000.265134044.0000000003767000.00000004.00000001.sdmp | Binary or memory string: VMware SATA CD00 |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.259984630.0000000002D51000.00000004.00000001.sdmp | Binary or memory string: VMWARE |
Source: explorer.exe, 00000003.00000002.522311765.00000000011B3000.00000004.00000020.sdmp | Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0 |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.260399670.000000000309F000.00000004.00000001.sdmp | Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: explorer.exe, 00000003.00000000.274567797.00000000089B5000.00000004.00000001.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000% |
Source: explorer.exe, 00000003.00000002.531888786.00000000053D7000.00000004.00000001.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\" |
Source: explorer.exe, 00000003.00000000.274132486.0000000008270000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: explorer.exe, 00000003.00000000.274132486.0000000008270000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: explorer.exe, 00000003.00000000.274567797.00000000089B5000.00000004.00000001.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002 |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.259984630.0000000002D51000.00000004.00000001.sdmp | Binary or memory string: VMware SVGA II |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.260399670.000000000309F000.00000004.00000001.sdmp | Binary or memory string: VMware |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.260399670.000000000309F000.00000004.00000001.sdmp | Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.260399670.000000000309F000.00000004.00000001.sdmp | Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000 |
Source: Purchase Order 40,7045$.exe, 00000000.00000002.259984630.0000000002D51000.00000004.00000001.sdmp | Binary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools |
Source: explorer.exe, 00000003.00000000.274132486.0000000008270000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0150B944 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0150B944 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014EC962 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014EB171 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014EB171 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014E9100 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014E9100 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014E9100 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0151513A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0151513A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01504120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01504120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01504120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01504120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01504120 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014EB1E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014EB1E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014EB1E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015741E8 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01512990 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0150C182 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0151A185 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015651BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015651BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015651BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015651BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015099BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015669A6 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015161A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015161A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A49A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A49A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A49A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A49A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01500050 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01500050 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015A2073 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_015B1074 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01567016 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01567016 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code funct |