Source: file.exe, 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: file.exe, 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003091000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: file.exe, 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003091000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: file.exe, 00000002.00000002.4144889269.0000000003091000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: file.exe, 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: file.exe, 00000002.00000002.4144889269.0000000003091000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: file.exe, 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003091000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fonts.com |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.tiro.com |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.typography.netD |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: file.exe, 00000000.00000002.1828496079.0000000006D92000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: file.exe, 00000002.00000002.4144889269.0000000003176000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: file.exe, 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003176000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: file.exe, 00000002.00000002.4144889269.0000000003176000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: file.exe, 00000002.00000002.4144889269.0000000003176000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:965543%0D%0ADate%20a |
Source: file.exe, 00000002.00000002.4144889269.0000000003253000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: file.exe, 00000002.00000002.4144889269.000000000324E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: file.exe, 00000002.00000002.4144889269.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003176000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003150000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: file.exe, 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: file.exe, 00000002.00000002.4144889269.000000000310B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: file.exe, 00000002.00000002.4144889269.0000000003176000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003150000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.000000000310B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: file.exe, 00000002.00000002.4148149933.0000000004316000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000041E7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004364000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004439000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.000000000319A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000041C0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004172000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: file.exe, 00000002.00000002.4148149933.0000000004178000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004414000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000041C2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.000000000414D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.000000000431C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000042F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: file.exe, 00000002.00000002.4148149933.0000000004316000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000041E7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004364000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004439000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.000000000319A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000041C0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004172000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: file.exe, 00000002.00000002.4148149933.0000000004178000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.0000000004414000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000041C2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.000000000414D000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.000000000431C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4148149933.00000000042F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: file.exe, 00000002.00000002.4144889269.0000000003284000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.0000000003275000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4144889269.000000000319A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: file.exe, 00000002.00000002.4144889269.000000000327F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lB |
Source: 0.2.file.exe.3c2d060.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.3c2d060.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.3c2d060.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.3c70280.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.3c70280.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.3c70280.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 2.2.file.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 2.2.file.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.file.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.3c70280.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.3c70280.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.3c70280.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.3c2d060.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.3c2d060.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000002.00000002.4143324040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1826174186.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: file.exe PID: 7568, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: file.exe PID: 7692, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, HyrVjh9CacVo9sXnV4.cs | High entropy of concatenated method names: 'TqcJU9MtB4', 'RhCJg5yxnH', 'pNPJyqfJr3', 'kBPJtEGKNx', 'LX2JVM1k2x', 'QRvJo8xwQH', 'Xw9JsVEiws', 'Lm5JInXkYD', 'VN8JaIks2b', 'IltJjbvrF6' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, ptp44AClmmRtQwH9OI.cs | High entropy of concatenated method names: 'ToString', 'tdRSjAuCL2', 'vlpStaSIXQ', 'TceSPqTDsS', 'Bt9SVYOBST', 'Qs4SoiFpkx', 'iKsSLdxaov', 'vQXSslo1ZX', 'aPLSIAVPNL', 'kVrSdEx01Y' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, jLx6J97JddKSKVYCTS.cs | High entropy of concatenated method names: 's93lrr8wfd', 'ykEln3DW2y', 'tUWmPJDbcU', 'oBQmV4XZ5x', 'm5umoQZS7G', 'UxEmLqUfEo', 'WErmslwgX8', 'c3lmIRlArf', 'BZMmdLJcY9', 'iTXmaCgd7P' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, na4FDnyOExEDDqNAoT.cs | High entropy of concatenated method names: 'UTfbhaJOGo', 'WF1bGoWCRr', 'nlrblMd6UV', 'weRbuAW658', 'Sr6bQ6XeZJ', 'G7KlBAEQey', 'Se5l6HQA00', 'Yf9lf5UgyY', 'OqQl4NviYc', 'muNlvPoewb' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, f3Qs7tzUqjxaSIcVDe.cs | High entropy of concatenated method names: 'I54Nq9X8iG', 'TECNUEvGYG', 'KZrNg0a8fA', 'Iq2NySjNJO', 'BDoNtAD3Bw', 'UDxNVS0jrq', 'n26NooBjZC', 'vKANcpcTbd', 'yFXN3dQRKn', 'D6INxP5FLu' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, vnF8bQU8cHxQZQTDPO.cs | High entropy of concatenated method names: 'mNsGZ7INQj', 'xZKG0klSJL', 'SQKGCDPHZo', 'scpGkuyfAc', 'ulOGBbxHVG', 'LgsG6yRm6U', 'D5WGfNXJcm', 'QZJG4rwhQh', 'GAZGvCYEJ3', 'ciLG59xxUY' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, MUKi7nQ9sYvdsQsUSw.cs | High entropy of concatenated method names: 'I4XpheYnAV', 'MTbpi5Olg9', 'ytIpGkMV1P', 'gxxpmLSZpp', 'HELpluRH8R', 'DmZpbZNVPp', 'D5bpuJ1SgR', 'zHwpQJrGDr', 'QTYpwCFCPd', 'OgZpKGZEMb' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, HSyrTIdPhOoMhSTO09.cs | High entropy of concatenated method names: 'WwBu3XdQUu', 'pVCux9wHir', 'j5MuF9b0fL', 'Lo3u88sKev', 'DYjurUP7Dm', 'hTIuq0j2Tf', 'lI3uniw50x', 'tQDuUvc3fA', 'KsuuggdwO0', 'Q4xu7AUKEF' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, faWF1Wf4SQe0KVDGFl.cs | High entropy of concatenated method names: 'oRqeRSv8bF', 'p5aeMM9RCt', 'u4seeJXmdb', 'IcMeH7Fdtn', 'RrAeTMJ6um', 'GWvec0Fo40', 'Dispose', 'BAbWi6mvi4', 'OPIWGFagv1', 'G4JWmeNfNo' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, iZcjPAkifOk9vWysUs.cs | High entropy of concatenated method names: 'Y6eMKxIkDK', 'V6JM1FyNVb', 'ToString', 'PjNMiK5ipU', 'Yq7MGZI05r', 'w50Mmj0q3k', 'ymwMlqN2aE', 'sqjMbKhBHg', 'zJsMumawNj', 'hOuMQ38rre' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, K234AYgBjhLT3xkslG.cs | High entropy of concatenated method names: 'Y6im8T1CdS', 'ovRmqoDav8', 'GXGmUcLeXb', 'MNpmgN77iC', 'VP5mRTnTMO', 'pQPmSmifIV', 'R72mMaJyst', 'RLcmWGMO7C', 'njemeRuqnQ', 'I08mNPuXnY' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, UttuLpGkkmZ8KDhNJ7.cs | High entropy of concatenated method names: 'Dispose', 'ke0DvKVDGF', 'WRIXtyWi6G', 'Pkm0a3a8Th', 'iCRD5BM7Ae', 'gW2DzwRpxh', 'ProcessDialogKey', 'tK0XEdqTBF', 'N6fXDRiC1g', 'YH7XXTfb7K' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, RdqTBFva6fRiC1g5H7.cs | High entropy of concatenated method names: 'JVgeyCmOVh', 'lnKet0YKC6', 'Dr0ePwcOAB', 'evceVbuYrd', 'rOQeoS7JRe', 'eOveLFRSxe', 'AMdes6mldK', 'eJ2eIukFtg', 'jUhedqMgsM', 'y4xeapSPHF' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, S3CT9ADEFVNxFGFiYcA.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'aaqNjFhnoK', 'yGjN2tNRx0', 'DiRN9cohO7', 'igoNZFkbxK', 'fVZN0YTngn', 'CmONCyQLKo', 'MAfNkaUwTD' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, btw8khDDwIfUUo5yHPb.cs | High entropy of concatenated method names: 'qSoN5joCIo', 'yUhNzdNnYn', 'LyRHEnBvVZ', 'QMkHDWeHc2', 'rNTHXVfuFB', 'EsSHpW9XxO', 'jn5HO2tOXi', 'wjWHh1e4sb', 'NDAHiA5oTR', 'wmiHGsDPoE' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, yytPU1sONoyt1BjlC2.cs | High entropy of concatenated method names: 'bEquiKZfs1', 'mJsumn5sCJ', 'rYiubemykZ', 'T3Ab5tmEYx', 'iM2bzZau7V', 'awLuEjWtgB', 'GsyuDfQOOJ', 'pt4uXZTORb', 'J81updjFoV', 'RcFuOEAfuK' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, Bu0C3TXbaFoYSwWkSy.cs | High entropy of concatenated method names: 'mHWFkgepb', 'Brw82RF5p', 'ITYqmEwcK', 'rkAnBYdF3', 'bDfg2pHnM', 'pFh7ArfRA', 'd6dpvw7RApF8NuAwpZ', 'PxdwBw3hoMF68KiFhn', 'tLyW5yRx7', 'nuEN7xYx7' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, vfb7Ke59TSLxHTW0EU.cs | High entropy of concatenated method names: 'R6kNmcfPph', 'r8KNllVvVk', 'SRxNbVEj0s', 'aTMNuuhdqZ', 'kGjNeTfW5f', 'djHNQdWy4q', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, Qr8SemmafTEU7mZ8y0.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'uwKXvyrnkg', 'rXQX5QSESK', 'T1qXza4Bsk', 'YdmpEyeFcx', 'E74pDNLR8A', 'fygpXiQfsL', 'NODppg9wx0', 'YbQLHj4SZN4XahxgmUJ' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, iYx3As6YC78M6Yk1NW.cs | High entropy of concatenated method names: 'tctM4upspg', 'rZqM5fXVfN', 'SH2WEDKcfZ', 'yj0WDWX5ip', 'N7yMjwDkvs', 'xi5M2hJZmD', 'dYfM9f2W6N', 'cDrMZnFH1I', 'ObtM0PD5Un', 'bodMCNrjnX' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, OxjRhtOH873C4t1wPt.cs | High entropy of concatenated method names: 'kWTDunF8bQ', 'AcHDQxQZQT', 'wBjDKhLT3x', 'TslD1GuLx6', 'JYCDRTSJa4', 'zDnDSOExED', 'T4MZLmQy3aCWr54XmB', 'oPk9JoCnByHwyEBIGJ', 'EixDD3ONge', 'n8BDpBPlnU' |
Source: 0.2.file.exe.3cb4880.2.raw.unpack, SaCVJsDO13IhBQaxLAA.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'GkKAeYTaNN', 'YhhANZTvoL', 'ubBAH55ptU', 'cRZAA4PbvF', 't3nAT2lvq0', 'F04AY4K3YM', 'rFaAcSjb1k' |
Source: 0.2.file.exe.7550000.5.raw.unpack, HyrVjh9CacVo9sXnV4.cs | High entropy of concatenated method names: 'TqcJU9MtB4', 'RhCJg5yxnH', 'pNPJyqfJr3', 'kBPJtEGKNx', 'LX2JVM1k2x', 'QRvJo8xwQH', 'Xw9JsVEiws', 'Lm5JInXkYD', 'VN8JaIks2b', 'IltJjbvrF6' |
Source: 0.2.file.exe.7550000.5.raw.unpack, ptp44AClmmRtQwH9OI.cs | High entropy of concatenated method names: 'ToString', 'tdRSjAuCL2', 'vlpStaSIXQ', 'TceSPqTDsS', 'Bt9SVYOBST', 'Qs4SoiFpkx', 'iKsSLdxaov', 'vQXSslo1ZX', 'aPLSIAVPNL', 'kVrSdEx01Y' |
Source: 0.2.file.exe.7550000.5.raw.unpack, jLx6J97JddKSKVYCTS.cs | High entropy of concatenated method names: 's93lrr8wfd', 'ykEln3DW2y', 'tUWmPJDbcU', 'oBQmV4XZ5x', 'm5umoQZS7G', 'UxEmLqUfEo', 'WErmslwgX8', 'c3lmIRlArf', 'BZMmdLJcY9', 'iTXmaCgd7P' |
Source: 0.2.file.exe.7550000.5.raw.unpack, na4FDnyOExEDDqNAoT.cs | High entropy of concatenated method names: 'UTfbhaJOGo', 'WF1bGoWCRr', 'nlrblMd6UV', 'weRbuAW658', 'Sr6bQ6XeZJ', 'G7KlBAEQey', 'Se5l6HQA00', 'Yf9lf5UgyY', 'OqQl4NviYc', 'muNlvPoewb' |
Source: 0.2.file.exe.7550000.5.raw.unpack, f3Qs7tzUqjxaSIcVDe.cs | High entropy of concatenated method names: 'I54Nq9X8iG', 'TECNUEvGYG', 'KZrNg0a8fA', 'Iq2NySjNJO', 'BDoNtAD3Bw', 'UDxNVS0jrq', 'n26NooBjZC', 'vKANcpcTbd', 'yFXN3dQRKn', 'D6INxP5FLu' |
Source: 0.2.file.exe.7550000.5.raw.unpack, vnF8bQU8cHxQZQTDPO.cs | High entropy of concatenated method names: 'mNsGZ7INQj', 'xZKG0klSJL', 'SQKGCDPHZo', 'scpGkuyfAc', 'ulOGBbxHVG', 'LgsG6yRm6U', 'D5WGfNXJcm', 'QZJG4rwhQh', 'GAZGvCYEJ3', 'ciLG59xxUY' |
Source: 0.2.file.exe.7550000.5.raw.unpack, MUKi7nQ9sYvdsQsUSw.cs | High entropy of concatenated method names: 'I4XpheYnAV', 'MTbpi5Olg9', 'ytIpGkMV1P', 'gxxpmLSZpp', 'HELpluRH8R', 'DmZpbZNVPp', 'D5bpuJ1SgR', 'zHwpQJrGDr', 'QTYpwCFCPd', 'OgZpKGZEMb' |
Source: 0.2.file.exe.7550000.5.raw.unpack, HSyrTIdPhOoMhSTO09.cs | High entropy of concatenated method names: 'WwBu3XdQUu', 'pVCux9wHir', 'j5MuF9b0fL', 'Lo3u88sKev', 'DYjurUP7Dm', 'hTIuq0j2Tf', 'lI3uniw50x', 'tQDuUvc3fA', 'KsuuggdwO0', 'Q4xu7AUKEF' |
Source: 0.2.file.exe.7550000.5.raw.unpack, faWF1Wf4SQe0KVDGFl.cs | High entropy of concatenated method names: 'oRqeRSv8bF', 'p5aeMM9RCt', 'u4seeJXmdb', 'IcMeH7Fdtn', 'RrAeTMJ6um', 'GWvec0Fo40', 'Dispose', 'BAbWi6mvi4', 'OPIWGFagv1', 'G4JWmeNfNo' |
Source: 0.2.file.exe.7550000.5.raw.unpack, iZcjPAkifOk9vWysUs.cs | High entropy of concatenated method names: 'Y6eMKxIkDK', 'V6JM1FyNVb', 'ToString', 'PjNMiK5ipU', 'Yq7MGZI05r', 'w50Mmj0q3k', 'ymwMlqN2aE', 'sqjMbKhBHg', 'zJsMumawNj', 'hOuMQ38rre' |
Source: 0.2.file.exe.7550000.5.raw.unpack, K234AYgBjhLT3xkslG.cs | High entropy of concatenated method names: 'Y6im8T1CdS', 'ovRmqoDav8', 'GXGmUcLeXb', 'MNpmgN77iC', 'VP5mRTnTMO', 'pQPmSmifIV', 'R72mMaJyst', 'RLcmWGMO7C', 'njemeRuqnQ', 'I08mNPuXnY' |
Source: 0.2.file.exe.7550000.5.raw.unpack, UttuLpGkkmZ8KDhNJ7.cs | High entropy of concatenated method names: 'Dispose', 'ke0DvKVDGF', 'WRIXtyWi6G', 'Pkm0a3a8Th', 'iCRD5BM7Ae', 'gW2DzwRpxh', 'ProcessDialogKey', 'tK0XEdqTBF', 'N6fXDRiC1g', 'YH7XXTfb7K' |
Source: 0.2.file.exe.7550000.5.raw.unpack, RdqTBFva6fRiC1g5H7.cs | High entropy of concatenated method names: 'JVgeyCmOVh', 'lnKet0YKC6', 'Dr0ePwcOAB', 'evceVbuYrd', 'rOQeoS7JRe', 'eOveLFRSxe', 'AMdes6mldK', 'eJ2eIukFtg', 'jUhedqMgsM', 'y4xeapSPHF' |
Source: 0.2.file.exe.7550000.5.raw.unpack, S3CT9ADEFVNxFGFiYcA.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'aaqNjFhnoK', 'yGjN2tNRx0', 'DiRN9cohO7', 'igoNZFkbxK', 'fVZN0YTngn', 'CmONCyQLKo', 'MAfNkaUwTD' |
Source: 0.2.file.exe.7550000.5.raw.unpack, btw8khDDwIfUUo5yHPb.cs | High entropy of concatenated method names: 'qSoN5joCIo', 'yUhNzdNnYn', 'LyRHEnBvVZ', 'QMkHDWeHc2', 'rNTHXVfuFB', 'EsSHpW9XxO', 'jn5HO2tOXi', 'wjWHh1e4sb', 'NDAHiA5oTR', 'wmiHGsDPoE' |
Source: 0.2.file.exe.7550000.5.raw.unpack, yytPU1sONoyt1BjlC2.cs | High entropy of concatenated method names: 'bEquiKZfs1', 'mJsumn5sCJ', 'rYiubemykZ', 'T3Ab5tmEYx', 'iM2bzZau7V', 'awLuEjWtgB', 'GsyuDfQOOJ', 'pt4uXZTORb', 'J81updjFoV', 'RcFuOEAfuK' |
Source: 0.2.file.exe.7550000.5.raw.unpack, Bu0C3TXbaFoYSwWkSy.cs | High entropy of concatenated method names: 'mHWFkgepb', 'Brw82RF5p', 'ITYqmEwcK', 'rkAnBYdF3', 'bDfg2pHnM', 'pFh7ArfRA', 'd6dpvw7RApF8NuAwpZ', 'PxdwBw3hoMF68KiFhn', 'tLyW5yRx7', 'nuEN7xYx7' |
Source: 0.2.file.exe.7550000.5.raw.unpack, vfb7Ke59TSLxHTW0EU.cs | High entropy of concatenated method names: 'R6kNmcfPph', 'r8KNllVvVk', 'SRxNbVEj0s', 'aTMNuuhdqZ', 'kGjNeTfW5f', 'djHNQdWy4q', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.file.exe.7550000.5.raw.unpack, Qr8SemmafTEU7mZ8y0.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'uwKXvyrnkg', 'rXQX5QSESK', 'T1qXza4Bsk', 'YdmpEyeFcx', 'E74pDNLR8A', 'fygpXiQfsL', 'NODppg9wx0', 'YbQLHj4SZN4XahxgmUJ' |
Source: 0.2.file.exe.7550000.5.raw.unpack, iYx3As6YC78M6Yk1NW.cs | High entropy of concatenated method names: 'tctM4upspg', 'rZqM5fXVfN', 'SH2WEDKcfZ', 'yj0WDWX5ip', 'N7yMjwDkvs', 'xi5M2hJZmD', 'dYfM9f2W6N', 'cDrMZnFH1I', 'ObtM0PD5Un', 'bodMCNrjnX' |
Source: 0.2.file.exe.7550000.5.raw.unpack, OxjRhtOH873C4t1wPt.cs | High entropy of concatenated method names: 'kWTDunF8bQ', 'AcHDQxQZQT', 'wBjDKhLT3x', 'TslD1GuLx6', 'JYCDRTSJa4', 'zDnDSOExED', 'T4MZLmQy3aCWr54XmB', 'oPk9JoCnByHwyEBIGJ', 'EixDD3ONge', 'n8BDpBPlnU' |
Source: 0.2.file.exe.7550000.5.raw.unpack, SaCVJsDO13IhBQaxLAA.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'GkKAeYTaNN', 'YhhANZTvoL', 'ubBAH55ptU', 'cRZAA4PbvF', 't3nAT2lvq0', 'F04AY4K3YM', 'rFaAcSjb1k' |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599781 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599671 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599343 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599234 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599125 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599015 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598906 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598797 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598343 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598234 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598125 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598015 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597906 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597797 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597541 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597437 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597328 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597219 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597109 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596890 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596781 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596344 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596219 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596109 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595890 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595781 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595343 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595234 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595125 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595015 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594906 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594797 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594687 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594578 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -24903104499507879s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 5480 | Thread sleep count: 9013 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 5480 | Thread sleep count: 851 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599671s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599234s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599125s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -599015s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598906s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598797s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598234s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598125s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -598015s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597906s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597797s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597541s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597437s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597328s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597219s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597109s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -597000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596344s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596219s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596109s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -596000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595234s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595125s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -595015s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -594906s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -594797s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -594687s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe TID: 7364 | Thread sleep time: -594578s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599781 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599671 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599343 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599234 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599125 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 599015 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598906 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598797 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598343 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598234 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598125 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 598015 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597906 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597797 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597541 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597437 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597328 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597219 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597109 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 597000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596890 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596781 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596344 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596219 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596109 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 596000 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595890 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595781 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595672 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595562 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595453 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595343 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595234 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595125 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 595015 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594906 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594797 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594687 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 594578 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Users\user\Desktop\file.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Users\user\Desktop\file.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |