Source: |
Binary string: \??\C:\Windows\dll\mscorlib.pdb# source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: Microsoft.VisualBasic.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Xml.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.ni.pdbRSDS source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdbp source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Configuration.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.ni.pdbRSDS7^3l source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Configuration.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: symbols\dll\mscorlib.pdbpdb` source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\mscorlib.pdba source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: 0C:\Windows\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.ni.pdbRSDS# source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Core.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: rootdows\mscorlib.pdbpdblib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B785000.00000004.00000020.00020000.00000000.sdmp, WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B74F000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Management.ni.pdbRSDSJ< source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Management.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: mscorlib.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Management.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Management.pdbP source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Core.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Configuration.ni.pdbRSDScUN source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: indoC:\Windows\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: \??\C:\Windows\mscorlib.pdb} source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Core.ni.pdbRSDS source: WERC6DF.tmp.dmp.6.dr |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: linkinfo.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: ntshrui.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: cscapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: avicap32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: msvfw32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: |
Binary string: \??\C:\Windows\dll\mscorlib.pdb# source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: Microsoft.VisualBasic.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Xml.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.ni.pdbRSDS source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdbp source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Configuration.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.ni.pdbRSDS7^3l source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Configuration.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: symbols\dll\mscorlib.pdbpdb` source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\mscorlib.pdba source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: 0C:\Windows\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.ni.pdbRSDS# source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Core.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: rootdows\mscorlib.pdbpdblib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B785000.00000004.00000020.00020000.00000000.sdmp, WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B74F000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Management.ni.pdbRSDSJ< source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Management.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: mscorlib.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Management.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Management.pdbP source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Core.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: System.Configuration.ni.pdbRSDScUN source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: indoC:\Windows\mscorlib.pdb source: 0eVxwphG1t.exe, 00000000.00000002.4105923006.000000001BAD9000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.ni.pdb source: WERC6DF.tmp.dmp.6.dr |
Source: |
Binary string: \??\C:\Windows\mscorlib.pdb} source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B718000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Core.ni.pdbRSDS source: WERC6DF.tmp.dmp.6.dr |
Source: 0eVxwphG1t.exe, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.UtRWsRb78ORCaMYqbKNVNp2r4XfpltBzFj1o,NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.kps8r9c6EPLqy1GbZCnS1qhwLqkeCs16l6ke,NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.dFuGB9pveQAjbnM2XU4z21rSYxk9Ec1dbJ6Y,NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.ZnTvChJCOVdKvRKrqb5Tq3AgshakA58qpm97,_5W9kCoGzxua5wJwSCTiFGiRuyWcrCS6GOQ2nivBdq7lIMEA4j1x7LNGHWiOniQoYjLx8.HNhob78vm3BnjkW8kHbWrqKIECFYPMsglRjFjWI0drQ7j592IQAMd25DhHCWmp272F4V()}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: 0eVxwphG1t.exe, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{CKOQMK148GFglgSBVjYtiAxG7xAEofbeughNGYpaC6gYBhAAbIUQAbitkzZzc3jbYJyV[2],_5W9kCoGzxua5wJwSCTiFGiRuyWcrCS6GOQ2nivBdq7lIMEA4j1x7LNGHWiOniQoYjLx8.m1XqTEoyMT0eJDnIIBLG295o4LJz7mmRbSeLpzG5LEfYWOp0BWqV6ngZVUnvLg5lHtV7(Convert.FromBase64String(CKOQMK148GFglgSBVjYtiAxG7xAEofbeughNGYpaC6gYBhAAbIUQAbitkzZzc3jbYJyV[3]))}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: WindowsUpdate.exe.0.dr, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.UtRWsRb78ORCaMYqbKNVNp2r4XfpltBzFj1o,NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.kps8r9c6EPLqy1GbZCnS1qhwLqkeCs16l6ke,NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.dFuGB9pveQAjbnM2XU4z21rSYxk9Ec1dbJ6Y,NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.ZnTvChJCOVdKvRKrqb5Tq3AgshakA58qpm97,_5W9kCoGzxua5wJwSCTiFGiRuyWcrCS6GOQ2nivBdq7lIMEA4j1x7LNGHWiOniQoYjLx8.HNhob78vm3BnjkW8kHbWrqKIECFYPMsglRjFjWI0drQ7j592IQAMd25DhHCWmp272F4V()}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: WindowsUpdate.exe.0.dr, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{CKOQMK148GFglgSBVjYtiAxG7xAEofbeughNGYpaC6gYBhAAbIUQAbitkzZzc3jbYJyV[2],_5W9kCoGzxua5wJwSCTiFGiRuyWcrCS6GOQ2nivBdq7lIMEA4j1x7LNGHWiOniQoYjLx8.m1XqTEoyMT0eJDnIIBLG295o4LJz7mmRbSeLpzG5LEfYWOp0BWqV6ngZVUnvLg5lHtV7(Convert.FromBase64String(CKOQMK148GFglgSBVjYtiAxG7xAEofbeughNGYpaC6gYBhAAbIUQAbitkzZzc3jbYJyV[3]))}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: 0eVxwphG1t.exe, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: Ozr3uT8eaovJxXIImVoMHRinyuULD72dG8BK System.AppDomain.Load(byte[]) |
Source: 0eVxwphG1t.exe, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: EMEt4b68XGaSFm266AfRPqDcYyQj8rXIFJUHBf0S3bJIK2INinyjbbZB1koFv1DqKUNJ System.AppDomain.Load(byte[]) |
Source: 0eVxwphG1t.exe, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: EMEt4b68XGaSFm266AfRPqDcYyQj8rXIFJUHBf0S3bJIK2INinyjbbZB1koFv1DqKUNJ |
Source: WindowsUpdate.exe.0.dr, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: Ozr3uT8eaovJxXIImVoMHRinyuULD72dG8BK System.AppDomain.Load(byte[]) |
Source: WindowsUpdate.exe.0.dr, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: EMEt4b68XGaSFm266AfRPqDcYyQj8rXIFJUHBf0S3bJIK2INinyjbbZB1koFv1DqKUNJ System.AppDomain.Load(byte[]) |
Source: WindowsUpdate.exe.0.dr, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
.Net Code: EMEt4b68XGaSFm266AfRPqDcYyQj8rXIFJUHBf0S3bJIK2INinyjbbZB1koFv1DqKUNJ |
Source: 0eVxwphG1t.exe, cRCOMDdbqKPFu5F8GnE1shveMLiwVXRkygCsrlwaTBvBcJB0CT3xLb.cs |
High entropy of concatenated method names: 'UQO9n34fYnuL8SWva0Kw4oGgeMEEzKN7mllqQqYcZnmJf4CetcEGu2', 'wL847gRuORfiQGP7tJeomi2Tkoh7i8z4CLu8hYDcc7pXNJqaac4O0v', 'eBfAhJB6A3XFFvloDH2CCcUSATbVyCrYkLTcncO6657h6CKxMleCMv', 'DYctTQtIsZhkTYDBdrJyABT6dlzt', 'B1YvDs6voifwnNqCRj489pGlwEot', 'dhb3M6clb2d1AzPORkPT9PEzS2VM', 'BD42hSvJKr7BpLWiqKC7C4R4tUlS', 'LuR0C8xfDPpOClUDV422zJDX75Sn', 'baEnoFCEPMyraBHaWHosdrfmrQGI', 'SGgMPlcRwpQOUeoWnYL754JtwR3Y' |
Source: 0eVxwphG1t.exe, NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.cs |
High entropy of concatenated method names: 'STUfgxhrSdjV4XgBdpChLl7QIIXw8Q2yXRYVblbg8Hy3WAG0a6y7SrI1mil5MryOhb6atX4alkhWc0lx8mh24u', 'qDrC9kS3MbD9tyact26Am6BoDu8ik9Jqlm4y7UcX1JOPjZXMakyq6ycCtLrtbyFvZSnC8BWjxHMYmU4crdsBpE', 'A8CrPHRj28zgzoj8ptDofKAgz4ijK7IXPpySIP5ont1olkpiNw7swwJJD8EiXyASI78kyHF0n4afM7BFAyc097', 'pOtMa1GIYoGrIMsabN5vQyOVxMVDyid7Cvnq0g7sVEe1Q0iqyaPU6o6DQw23lrgXm9D5cMMimEyoMnqFfi0aSA' |
Source: 0eVxwphG1t.exe, 2FieeZoxiTDXDNjEWT1OqSU5s1XYPlf9kzYKa4ePGKpDZOKibFSqWxny0ecBKXGxqotIPl4mUVZm3AysQM78jx2CUeN1ne.cs |
High entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_89JHJfFhZEzOBVAIMYR7MKQo9zbdNlcrFVMiO80sfGgKMC3Hv2OSNZNbLu0qJMRxiKu806BoDxY2PtqmBjDdkr', 'DN6aYJMFUpGfWPOEJS4HiujUiq33EApJUJOMFut7EVqCUZ4XxYjHDMzPFDrwDnCbIast1Ikzp6VPS6Dn6ISp8n', 'cnwFBporhrgKDwvriG8nFq9hZoI7iVdAvJHOQaH9PJx9Y1U9tKoiAF6jyEwUaGWlOqL8q9n901OB4vdkuKupFb', 'I2T7mFnNuqr9durNOMGHfTmlU1ZbP8L0Gdr4ul3a5a1m0WkcJe5N2GGvYxWFR4MJikn2XCbtbbCHVz4HPk2HNJ' |
Source: 0eVxwphG1t.exe, DE2MvAPSWigWdh7UaW8MR0AITzj0hT8jVkjr.cs |
High entropy of concatenated method names: 'JTBOR3InHhnTbqdVNpU3RYSx2W86iUnIGsVr', 'CnDvhk2ebTfG8k4pm4xjXXlW6WSCkJjVEKoJ', 'FU7smCBzsebdudxbrXV2PxpSIIdLwemfOuwI', '_2PqW6zr1TxluRHZ5SjaD8OMQrE4o0cWMzrFK', '_6I4KhgXAwiXEdXCCg9K08EJjpYw1CRljcFof', 'TLtxObiGH5j02Ka6KuxTtSPedNrZ3g7vMFX6', 'IvRORgLzFTKJzk20ZShD1ZBVgcexIbfeAiqa', 'fubKyF6llPJZmP1zH6mNPjlfhcRFEi8y1z8A', 'KmOyGqz6w1xBbx6MgxMfV2HO9hk8pw8V5HYo', 'vUNhCQsx2CQBZBFiErLJhQ2XReqX9aUykKC8' |
Source: 0eVxwphG1t.exe, 5W9kCoGzxua5wJwSCTiFGiRuyWcrCS6GOQ2nivBdq7lIMEA4j1x7LNGHWiOniQoYjLx8.cs |
High entropy of concatenated method names: 'w0zMD4mJpYnUcLQohA9g4kcN9Xkk3nUajyT91qQ20D5fwuPyNKMPVJqEdcdrKhV8pPZZ', 'SxHgRWikAX5tkUzq3NTLJXpRqPudWegWuzQJwrLKid2piU8dnDb5gZtJbKj2RJr0b9sU', 'xbfANXT2ocgqa1chjXHpdagiKBTQq33UYFBeg56bihcw6l8j11XjAvMps1HIES2G8tVl', 'ZLC62MSSJ0HDvrimkPappkfUeCfUcmUhnKrMifvizpo5Vr4ugiY9uzgBy4sdNtNhMTLT', 'L9ahTWqyW44oyKe01AkXCkmHWgzbsa4JineiEK4XJDx0dzMP1fmN3pMtqvqu35hobYxi', 'RF3qdwNfq6Djo1ZFMgdNZUR3MmJIbSkHRWbrIy8BerfsbY6tN7j3j6D85vbK8Lhsant7', '_3QzwXsYRb6Qgzq9vjHm07DMORe8vPh60aprpOyAmo7xyzcu78LBJkgoGHQErzianmisR', 'eg4yvAkTV2qToVPnYlyzLZYqPeN4N6CGhWcTeSClIBJRVMsEycwk6NiLZN8bPcJDLEns', 'CCDA1gEAboHxDd85lR3Ohnz8R0dFNBNMplCBhwdqFkhUPB79iyawJWZOrhAGBdwhaaWk', '_5ZDDPamFsddB5qIIp3OxFSwCDbWBTMK2wnzrJamMj2vbubIjXmVlaxZQMyw3sin2YgGI' |
Source: 0eVxwphG1t.exe, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
High entropy of concatenated method names: '_2CT9zJFCBcpXeFux6hA1o7hqfwI9uWv3gt3B', 'Ozr3uT8eaovJxXIImVoMHRinyuULD72dG8BK', '_8gJcLgq7jzxStXF7qb3x6CkalA37JhEK2fxJ', 'xo5xOENIs8UrKarqP52WXv2RQFMOH1S82GLv', 'e16Yza0dJsOYui6yKawhJvSEfG4l6ekUWvtC', 'CDgiSxNMTZglqSaYapUzpvhjdfnDLkjVzWRU1Pyy37sBrFjw3IAmzX5MUdFmVjPSfhZI', 'lhKc6xVtCMRWAuZtDq3WpsPtFjuuN2rwtdnYgIGxOriF1VKIgnoDSqIjkQagtUOtDp5G', 'IUfM4E9XaOmRr4ZxstxzaeKiOIrydFNsvkGvSpyS4FjrsCfK0NnZXM7fuPh0seSQyQeT', 'rZAXzsWn7uMMRHkNk2mOnZuJRYYOW3RLJObCl93ZxJKO0AS6RoeUEcICiVAOR8vEV02F', 'vFvhhv3TFzBjRzdH7IJsrZc6rWs18bd6FQ0NoSyPEiFI39LZt4RS275ssZZvMFoKhlfo' |
Source: 0eVxwphG1t.exe, tuDuo8205kScreoQpUjwwMNgueGyyZTo9789sAYBn77OjYUDWlcZKdVHKKHXzpdSCdKj.cs |
High entropy of concatenated method names: '_2oxGGVQpEBTlPtR5DKLKPHfk9yO2h1zRDfnAc9bscdUG5sit2AoNFlnAhLTKX65cddai', 'q8QQeInw5qjBEK9K0cn1EbHFDvC0', 'QYyYZUqahzWX7r6HuE4pJfb9pB1V', '_1gjz9r0gUsM6K91UOgGWfcHVYeSi', 'NrWOAaiFz1oXFzOfUnR1EousJgFs' |
Source: 0eVxwphG1t.exe, kKeIJ3B7Gw7AL2SuTxWQYCmRQaW82ounaBT9.cs |
High entropy of concatenated method names: '_9MXi1y0sfYjJLWGodwihmq7JAcv663pWa8DE', 'BNBjpiejkOAFnbXvfWPjcgEZQ8vlmgJmx7n7', 'euxgagvMX9FafDjEx28lv8OV1pq3LkM0inUy', 'CvekXDiXp1vk6ry3OXJc1FxkdlhfNiWRV7N6S5pCrrTGQFzeBcPPk6p4mXim30IGHe3aalon941fVHP4nzKM5J', 'JUioR6fzXb266VPo6z6mudpH0zDh', 'Mt8uVUMWPxk664x2njevTl5QZIz3', 'UVPqT7Oh9gD8GYnq0SZM3LZSMJop', '_3cjsgZrRrM4qGvn1NuJZozDIyfjy', 'qDEhL9fYr9O8q3UBNndvpTel3nxi', 'axC67nR0zUMQ39t52bPOx1liB9a2' |
Source: 0eVxwphG1t.exe, kPGpDohW3nQJpwycTGI7iXhSKEYGqzf8YZdLQ70YE6XqTU6Kxg9gzknnnvFowAD53Se6.cs |
High entropy of concatenated method names: 'PQ2Zs76XS0Hsl8yZluuyhoqmO4wfzeUvV3vk1V0Y8PmBGHh8v2y0KBeJxBwSTEWgNJ2S', 'k7ZuBDkae0jag5T3GJY6LsuZ0Qko', 'tnpeGYMV7Riljk8QKeh2zr1CVt5x', 'uiWPIHbwE896L5fqSQxqlm70fAsi', '_9MaNeM3p4O5LF9hQzntV4LKzA1Y1' |
Source: WindowsUpdate.exe.0.dr, cRCOMDdbqKPFu5F8GnE1shveMLiwVXRkygCsrlwaTBvBcJB0CT3xLb.cs |
High entropy of concatenated method names: 'UQO9n34fYnuL8SWva0Kw4oGgeMEEzKN7mllqQqYcZnmJf4CetcEGu2', 'wL847gRuORfiQGP7tJeomi2Tkoh7i8z4CLu8hYDcc7pXNJqaac4O0v', 'eBfAhJB6A3XFFvloDH2CCcUSATbVyCrYkLTcncO6657h6CKxMleCMv', 'DYctTQtIsZhkTYDBdrJyABT6dlzt', 'B1YvDs6voifwnNqCRj489pGlwEot', 'dhb3M6clb2d1AzPORkPT9PEzS2VM', 'BD42hSvJKr7BpLWiqKC7C4R4tUlS', 'LuR0C8xfDPpOClUDV422zJDX75Sn', 'baEnoFCEPMyraBHaWHosdrfmrQGI', 'SGgMPlcRwpQOUeoWnYL754JtwR3Y' |
Source: WindowsUpdate.exe.0.dr, NygBuQ1TMjqtZzDbHLnJHxOGXTTwnviKJhvZ.cs |
High entropy of concatenated method names: 'STUfgxhrSdjV4XgBdpChLl7QIIXw8Q2yXRYVblbg8Hy3WAG0a6y7SrI1mil5MryOhb6atX4alkhWc0lx8mh24u', 'qDrC9kS3MbD9tyact26Am6BoDu8ik9Jqlm4y7UcX1JOPjZXMakyq6ycCtLrtbyFvZSnC8BWjxHMYmU4crdsBpE', 'A8CrPHRj28zgzoj8ptDofKAgz4ijK7IXPpySIP5ont1olkpiNw7swwJJD8EiXyASI78kyHF0n4afM7BFAyc097', 'pOtMa1GIYoGrIMsabN5vQyOVxMVDyid7Cvnq0g7sVEe1Q0iqyaPU6o6DQw23lrgXm9D5cMMimEyoMnqFfi0aSA' |
Source: WindowsUpdate.exe.0.dr, 2FieeZoxiTDXDNjEWT1OqSU5s1XYPlf9kzYKa4ePGKpDZOKibFSqWxny0ecBKXGxqotIPl4mUVZm3AysQM78jx2CUeN1ne.cs |
High entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_89JHJfFhZEzOBVAIMYR7MKQo9zbdNlcrFVMiO80sfGgKMC3Hv2OSNZNbLu0qJMRxiKu806BoDxY2PtqmBjDdkr', 'DN6aYJMFUpGfWPOEJS4HiujUiq33EApJUJOMFut7EVqCUZ4XxYjHDMzPFDrwDnCbIast1Ikzp6VPS6Dn6ISp8n', 'cnwFBporhrgKDwvriG8nFq9hZoI7iVdAvJHOQaH9PJx9Y1U9tKoiAF6jyEwUaGWlOqL8q9n901OB4vdkuKupFb', 'I2T7mFnNuqr9durNOMGHfTmlU1ZbP8L0Gdr4ul3a5a1m0WkcJe5N2GGvYxWFR4MJikn2XCbtbbCHVz4HPk2HNJ' |
Source: WindowsUpdate.exe.0.dr, DE2MvAPSWigWdh7UaW8MR0AITzj0hT8jVkjr.cs |
High entropy of concatenated method names: 'JTBOR3InHhnTbqdVNpU3RYSx2W86iUnIGsVr', 'CnDvhk2ebTfG8k4pm4xjXXlW6WSCkJjVEKoJ', 'FU7smCBzsebdudxbrXV2PxpSIIdLwemfOuwI', '_2PqW6zr1TxluRHZ5SjaD8OMQrE4o0cWMzrFK', '_6I4KhgXAwiXEdXCCg9K08EJjpYw1CRljcFof', 'TLtxObiGH5j02Ka6KuxTtSPedNrZ3g7vMFX6', 'IvRORgLzFTKJzk20ZShD1ZBVgcexIbfeAiqa', 'fubKyF6llPJZmP1zH6mNPjlfhcRFEi8y1z8A', 'KmOyGqz6w1xBbx6MgxMfV2HO9hk8pw8V5HYo', 'vUNhCQsx2CQBZBFiErLJhQ2XReqX9aUykKC8' |
Source: WindowsUpdate.exe.0.dr, 5W9kCoGzxua5wJwSCTiFGiRuyWcrCS6GOQ2nivBdq7lIMEA4j1x7LNGHWiOniQoYjLx8.cs |
High entropy of concatenated method names: 'w0zMD4mJpYnUcLQohA9g4kcN9Xkk3nUajyT91qQ20D5fwuPyNKMPVJqEdcdrKhV8pPZZ', 'SxHgRWikAX5tkUzq3NTLJXpRqPudWegWuzQJwrLKid2piU8dnDb5gZtJbKj2RJr0b9sU', 'xbfANXT2ocgqa1chjXHpdagiKBTQq33UYFBeg56bihcw6l8j11XjAvMps1HIES2G8tVl', 'ZLC62MSSJ0HDvrimkPappkfUeCfUcmUhnKrMifvizpo5Vr4ugiY9uzgBy4sdNtNhMTLT', 'L9ahTWqyW44oyKe01AkXCkmHWgzbsa4JineiEK4XJDx0dzMP1fmN3pMtqvqu35hobYxi', 'RF3qdwNfq6Djo1ZFMgdNZUR3MmJIbSkHRWbrIy8BerfsbY6tN7j3j6D85vbK8Lhsant7', '_3QzwXsYRb6Qgzq9vjHm07DMORe8vPh60aprpOyAmo7xyzcu78LBJkgoGHQErzianmisR', 'eg4yvAkTV2qToVPnYlyzLZYqPeN4N6CGhWcTeSClIBJRVMsEycwk6NiLZN8bPcJDLEns', 'CCDA1gEAboHxDd85lR3Ohnz8R0dFNBNMplCBhwdqFkhUPB79iyawJWZOrhAGBdwhaaWk', '_5ZDDPamFsddB5qIIp3OxFSwCDbWBTMK2wnzrJamMj2vbubIjXmVlaxZQMyw3sin2YgGI' |
Source: WindowsUpdate.exe.0.dr, hF9D3AYeWElxQJ4yvTCTUARmJz8B1bpMvhWu.cs |
High entropy of concatenated method names: '_2CT9zJFCBcpXeFux6hA1o7hqfwI9uWv3gt3B', 'Ozr3uT8eaovJxXIImVoMHRinyuULD72dG8BK', '_8gJcLgq7jzxStXF7qb3x6CkalA37JhEK2fxJ', 'xo5xOENIs8UrKarqP52WXv2RQFMOH1S82GLv', 'e16Yza0dJsOYui6yKawhJvSEfG4l6ekUWvtC', 'CDgiSxNMTZglqSaYapUzpvhjdfnDLkjVzWRU1Pyy37sBrFjw3IAmzX5MUdFmVjPSfhZI', 'lhKc6xVtCMRWAuZtDq3WpsPtFjuuN2rwtdnYgIGxOriF1VKIgnoDSqIjkQagtUOtDp5G', 'IUfM4E9XaOmRr4ZxstxzaeKiOIrydFNsvkGvSpyS4FjrsCfK0NnZXM7fuPh0seSQyQeT', 'rZAXzsWn7uMMRHkNk2mOnZuJRYYOW3RLJObCl93ZxJKO0AS6RoeUEcICiVAOR8vEV02F', 'vFvhhv3TFzBjRzdH7IJsrZc6rWs18bd6FQ0NoSyPEiFI39LZt4RS275ssZZvMFoKhlfo' |
Source: WindowsUpdate.exe.0.dr, tuDuo8205kScreoQpUjwwMNgueGyyZTo9789sAYBn77OjYUDWlcZKdVHKKHXzpdSCdKj.cs |
High entropy of concatenated method names: '_2oxGGVQpEBTlPtR5DKLKPHfk9yO2h1zRDfnAc9bscdUG5sit2AoNFlnAhLTKX65cddai', 'q8QQeInw5qjBEK9K0cn1EbHFDvC0', 'QYyYZUqahzWX7r6HuE4pJfb9pB1V', '_1gjz9r0gUsM6K91UOgGWfcHVYeSi', 'NrWOAaiFz1oXFzOfUnR1EousJgFs' |
Source: WindowsUpdate.exe.0.dr, kKeIJ3B7Gw7AL2SuTxWQYCmRQaW82ounaBT9.cs |
High entropy of concatenated method names: '_9MXi1y0sfYjJLWGodwihmq7JAcv663pWa8DE', 'BNBjpiejkOAFnbXvfWPjcgEZQ8vlmgJmx7n7', 'euxgagvMX9FafDjEx28lv8OV1pq3LkM0inUy', 'CvekXDiXp1vk6ry3OXJc1FxkdlhfNiWRV7N6S5pCrrTGQFzeBcPPk6p4mXim30IGHe3aalon941fVHP4nzKM5J', 'JUioR6fzXb266VPo6z6mudpH0zDh', 'Mt8uVUMWPxk664x2njevTl5QZIz3', 'UVPqT7Oh9gD8GYnq0SZM3LZSMJop', '_3cjsgZrRrM4qGvn1NuJZozDIyfjy', 'qDEhL9fYr9O8q3UBNndvpTel3nxi', 'axC67nR0zUMQ39t52bPOx1liB9a2' |
Source: WindowsUpdate.exe.0.dr, kPGpDohW3nQJpwycTGI7iXhSKEYGqzf8YZdLQ70YE6XqTU6Kxg9gzknnnvFowAD53Se6.cs |
High entropy of concatenated method names: 'PQ2Zs76XS0Hsl8yZluuyhoqmO4wfzeUvV3vk1V0Y8PmBGHh8v2y0KBeJxBwSTEWgNJ2S', 'k7ZuBDkae0jag5T3GJY6LsuZ0Qko', 'tnpeGYMV7Riljk8QKeh2zr1CVt5x', 'uiWPIHbwE896L5fqSQxqlm70fAsi', '_9MaNeM3p4O5LF9hQzntV4LKzA1Y1' |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.6.dr |
Binary or memory string: vmci.syshbin |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware, Inc. |
Source: 0eVxwphG1t.exe, 00000000.00000002.4105625849.000000001B6E0000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW %SystemRoot%\system32\mswsock.dll </workflowInstanceQuery> |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.6.dr |
Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.6.dr |
Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.6.dr |
Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: Amcache.hve.6.dr |
Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.6.dr |
Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.6.dr |
Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.6.dr |
Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.6.dr |
Binary or memory string: vmci.sys |
Source: Amcache.hve.6.dr |
Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.6.dr |
Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.6.dr |
Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware20,1 |
Source: Amcache.hve.6.dr |
Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.6.dr |
Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.6.dr |
Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.6.dr |
Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.6.dr |
Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.6.dr |
Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.6.dr |
Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.6.dr |
Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\0eVxwphG1t.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |