Source: PURCHASE ORDER.exe, 00000004.00000002.503023451.0000000003541000.00000004.00000001.sdmp | String found in binary or memory: http://127.0.0.1:HTTP/1.1 |
Source: PURCHASE ORDER.exe, 00000004.00000002.503023451.0000000003541000.00000004.00000001.sdmp | String found in binary or memory: http://DynDns.comDynDNS |
Source: PURCHASE ORDER.exe, 00000004.00000002.503023451.0000000003541000.00000004.00000001.sdmp | String found in binary or memory: http://UZkOts.com |
Source: PURCHASE ORDER.exe, 00000004.00000002.503023451.0000000003541000.00000004.00000001.sdmp | String found in binary or memory: https://api.ipify.org% |
Source: PURCHASE ORDER.exe, 00000004.00000002.503023451.0000000003541000.00000004.00000001.sdmp | String found in binary or memory: https://api.ipify.org%GETMozilla/5.0 |
Source: PURCHASE ORDER.exe, 00000004.00000002.503023451.0000000003541000.00000004.00000001.sdmp, PURCHASE ORDER.exe, 00000004.00000002.503328534.0000000003589000.00000004.00000001.sdmp | String found in binary or memory: https://kMicsa3HazLTjD.net |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css |
Source: PURCHASE ORDER.exe, 00000000.00000002.239232235.0000000004171000.00000004.00000001.sdmp, PURCHASE ORDER.exe, 00000004.00000002.498714437.0000000000402000.00000040.00000001.sdmp | String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip |
Source: PURCHASE ORDER.exe, 00000004.00000002.503023451.0000000003541000.00000004.00000001.sdmp | String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05322013 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532DCC8 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05322B18 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053217B0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532E3A8 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05321BE8 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532DFD8 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532EA08 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05324AA0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053232FB |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053212E3 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05320AC3 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05326D70 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053269BD |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053249A1 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053215E0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053215D0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532ADD8 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05325810 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05325803 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532A808 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05322B0B |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532C348 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05326BB0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05326BA3 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053217AB |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532A791 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053267F0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05321BE3 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053267EB |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532B610 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05326278 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05320E61 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532626B |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532CAA0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05324A9B |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_0532BA88 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053236E0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_062D0006 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_062D0070 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_062D1AF6 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_0300D357 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_0300D7B8 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_0300BBBA |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_03009A90 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_06480070 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064E5340 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064E0070 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064EABD0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064E8AE0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064ED6F0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064EA1A0 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064EE2B1 |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064E0006 |
Source: PURCHASE ORDER.exe, 00000000.00000002.239511278.000000000434A000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameDSASignature.dll@ vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameMqlBKgQGWGuIUcraWbDAeFtcNvdPyLI.exe4 vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.242160824.0000000005FF0000.00000002.00000001.sdmp | Binary or memory string: System.OriginalFileName vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.239873716.00000000053A0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamemscorrc.dllT vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.242274006.00000000060F0000.00000002.00000001.sdmp | Binary or memory string: originalfilename vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.242274006.00000000060F0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamepropsys.dll.mui@ vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.238019794.0000000000B5C000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameDefaultInterfaceAttribute.exeP vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.238942135.0000000003171000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameSimpleUI.dll( vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000003.00000002.236766536.000000000043C000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameDefaultInterfaceAttribute.exeP vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000004.00000002.505299124.0000000006010000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamewshom.ocx.mui vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000004.00000002.504596475.0000000005800000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000004.00000002.500345558.0000000001597000.00000004.00000020.sdmp | Binary or memory string: OriginalFilenamemscorwks.dllT vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000004.00000000.237489374.0000000000E2C000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameDefaultInterfaceAttribute.exeP vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000004.00000002.505195502.0000000005F10000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamemscorrc.dllT vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000004.00000002.505049092.0000000005D80000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamewshom.ocx vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000004.00000002.498714437.0000000000402000.00000040.00000001.sdmp | Binary or memory string: OriginalFilenameMqlBKgQGWGuIUcraWbDAeFtcNvdPyLI.exe4 vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe | Binary or memory string: OriginalFilenameDefaultInterfaceAttribute.exeP vs PURCHASE ORDER.exe |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: Select * from Clientes WHERE id=@id;; |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data); |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: Select * from SecurityLogonType WHERE id=@id; |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo; |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade); |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone); |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data); |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor); |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo) |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_01252B74 push cs; ret |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_01252F56 push ss; ret |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_01267D03 pushfd ; ret |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_01267C21 push ecx; iretd |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_01267C43 push ebp; iretd |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053201DB push ds; iretd |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05320C6F push dword ptr [ebp+eax-18h]; ret |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_053200F8 push ds; iretd |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 0_2_05321BD8 push eax; iretd |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_013F2954 push cs; ret |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_0300B4C2 push esp; retf |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Code function: 4_2_064EA0C9 push es; ret |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\PURCHASE ORDER.exe | Process information set: NOOPENFILEERRORBOX |
Source: PURCHASE ORDER.exe, 00000004.00000002.504596475.0000000005800000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: vmware |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath " |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: VMWARE |
Source: PURCHASE ORDER.exe, 00000004.00000002.500468169.000000000160C000.00000004.00000020.sdmp | Binary or memory string: Hyper-V RAW13F2-6063-4D7F-8700-992855A4 |
Source: PURCHASE ORDER.exe, 00000004.00000002.500513631.0000000001639000.00000004.00000020.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllI |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: PURCHASE ORDER.exe, 00000004.00000002.504596475.0000000005800000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: PURCHASE ORDER.exe, 00000004.00000002.504596475.0000000005800000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: VMware SVGA II |
Source: PURCHASE ORDER.exe, 00000000.00000002.238977520.000000000319B000.00000004.00000001.sdmp | Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000 |
Source: PURCHASE ORDER.exe, 00000004.00000002.504596475.0000000005800000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |