Source: RegSvcs.exe, 00000007.00000002.2269652870.000000000347D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.0000000003498000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000348B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000328A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000332B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003346000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000331D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003338000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003373000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003382000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: RegSvcs.exe, 00000007.00000002.2269652870.000000000347D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.0000000003498000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000033DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000342D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000348B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000328A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000332B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.00000000032CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003354000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003346000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000327E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000331D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003338000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003373000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003382000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: RegSvcs.exe, 00000007.00000002.2269652870.0000000003321000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.00000000031C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: file.exe, 00000000.00000002.2186804007.0000000004263000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2266573165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, aVmZDnwW.exe, 00000008.00000002.2233081731.0000000004118000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: file.exe, aVmZDnwW.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: file.exe, aVmZDnwW.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: file.exe, aVmZDnwW.exe.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: RegSvcs.exe, 00000007.00000002.2269652870.000000000347D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.0000000003402000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.0000000003498000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000348B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000332B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003346000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000331D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003338000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003373000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003382000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.00000000032A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: file.exe, 00000000.00000002.2185937260.0000000002D76000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.0000000003321000.00000004.00000800.00020000.00000000.sdmp, aVmZDnwW.exe, 00000008.00000002.2229755626.00000000028B9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.00000000031C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: RegSvcs.exe, 00000007.00000002.2269652870.000000000347D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.0000000003498000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000342D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000348B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000328A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000332B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.00000000032CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003346000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000331D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003338000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003373000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003382000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: file.exe, 00000000.00000002.2186804007.0000000004263000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2266573165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, aVmZDnwW.exe, 00000008.00000002.2233081731.0000000004118000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000328A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: RegSvcs.exe, 0000000C.00000002.2314110382.0000000003382000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: RegSvcs.exe, 00000007.00000002.2269652870.000000000347D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.0000000003498000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000342D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.000000000348B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2269652870.00000000034D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000332B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.00000000032CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003346000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.000000000331D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003338000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003373000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.2314110382.0000000003382000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: file.exe, aVmZDnwW.exe.0.dr | String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.file.exe.4408da8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.file.exe.4408da8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.file.exe.4408da8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.41c3878.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.aVmZDnwW.exe.41c3878.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.41c3878.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.411c690.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 8.2.aVmZDnwW.exe.411c690.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 8.2.aVmZDnwW.exe.411c690.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000007.00000002.2266573165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000007.00000002.2266573165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000008.00000002.2233081731.0000000004118000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000008.00000002.2233081731.0000000004118000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000000.00000002.2186804007.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000002.2186804007.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: file.exe PID: 3752, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: file.exe PID: 3752, type: MEMORYSTR | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: RegSvcs.exe PID: 7276, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: RegSvcs.exe PID: 7276, type: MEMORYSTR | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: aVmZDnwW.exe PID: 7328, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: aVmZDnwW.exe PID: 7328, type: MEMORYSTR | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E13D0 | 0_2_028E13D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E8379 | 0_2_028E8379 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028EA0B2 | 0_2_028EA0B2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E0878 | 0_2_028E0878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E2698 | 0_2_028E2698 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E1C60 | 0_2_028E1C60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E35A8 | 0_2_028E35A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E92A5 | 0_2_028E92A5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E92D0 | 0_2_028E92D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E5B90 | 0_2_028E5B90 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E5BA0 | 0_2_028E5BA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E5308 | 0_2_028E5308 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E1332 | 0_2_028E1332 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E5000 | 0_2_028E5000 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E2118 | 0_2_028E2118 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E5919 | 0_2_028E5919 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E5928 | 0_2_028E5928 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E56A8 | 0_2_028E56A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E16A7 | 0_2_028E16A7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E56B8 | 0_2_028E56B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E4FF0 | 0_2_028E4FF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E4499 | 0_2_028E4499 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E44A8 | 0_2_028E44A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E34ED | 0_2_028E34ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E8C29 | 0_2_028E8C29 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E8C70 | 0_2_028E8C70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_028E5DAA | 0_2_028E5DAA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_029AA598 | 0_2_029AA598 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_029AA5A8 | 0_2_029AA5A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_029A85EC | 0_2_029A85EC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0994A0F0 | 0_2_0994A0F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09941CD0 | 0_2_09941CD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09941CC0 | 0_2_09941CC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0998C390 | 0_2_0998C390 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09985198 | 0_2_09985198 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09984928 | 0_2_09984928 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09986DD0 | 0_2_09986DD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09986DC0 | 0_2_09986DC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09984D60 | 0_2_09984D60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09986438 | 0_2_09986438 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_09986428 | 0_2_09986428 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A9EE8 | 0_2_0A0A9EE8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A9180 | 0_2_0A0A9180 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A6B17 | 0_2_0A0A6B17 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A6B28 | 0_2_0A0A6B28 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0ADE68 | 0_2_0A0ADE68 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A4DD0 | 0_2_0A0A4DD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A4DE0 | 0_2_0A0A4DE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A70C9 | 0_2_0A0A70C9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0A0A70D8 | 0_2_0A0A70D8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319B328 | 7_2_0319B328 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_03196108 | 7_2_03196108 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319C190 | 7_2_0319C190 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_03196730 | 7_2_03196730 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319C751 | 7_2_0319C751 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319C470 | 7_2_0319C470 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319BBD3 | 7_2_0319BBD3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319CA31 | 7_2_0319CA31 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_03194AD9 | 7_2_03194AD9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_03199858 | 7_2_03199858 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319BEB0 | 7_2_0319BEB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_03193570 | 7_2_03193570 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 7_2_0319B4F3 | 7_2_0319B4F3 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E0A0B9 | 8_2_00E0A0B9 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E00878 | 8_2_00E00878 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E013D0 | 8_2_00E013D0 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E08379 | 8_2_00E08379 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E01C60 | 8_2_00E01C60 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E035A8 | 8_2_00E035A8 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E02698 | 8_2_00E02698 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E05000 | 8_2_00E05000 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E05928 | 8_2_00E05928 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E02118 | 8_2_00E02118 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E05919 | 8_2_00E05919 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E092D0 | 8_2_00E092D0 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E092AD | 8_2_00E092AD |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E05BA0 | 8_2_00E05BA0 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E05B90 | 8_2_00E05B90 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E05308 | 8_2_00E05308 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E044A8 | 8_2_00E044A8 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E04499 | 8_2_00E04499 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E08C70 | 8_2_00E08C70 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E08C29 | 8_2_00E08C29 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E05DA9 | 8_2_00E05DA9 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E016A0 | 8_2_00E016A0 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E056A8 | 8_2_00E056A8 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E056B8 | 8_2_00E056B8 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_00E04FF0 | 8_2_00E04FF0 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09A6176C | 8_2_09A6176C |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09A61C68 | 8_2_09A61C68 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DBB1A8 | 8_2_09DBB1A8 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DB4840 | 8_2_09DB4840 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DB5AD0 | 8_2_09DB5AD0 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DB5AE0 | 8_2_09DB5AE0 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DB6478 | 8_2_09DB6478 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DB6468 | 8_2_09DB6468 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DB4408 | 8_2_09DB4408 |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Code function: 8_2_09DB3FD0 | 8_2_09DB3FD0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303B328 | 12_2_0303B328 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_03036108 | 12_2_03036108 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303C190 | 12_2_0303C190 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303C752 | 12_2_0303C752 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303C470 | 12_2_0303C470 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303BBD2 | 12_2_0303BBD2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303CA32 | 12_2_0303CA32 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_03034AD9 | 12_2_03034AD9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_03039858 | 12_2_03039858 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_03036880 | 12_2_03036880 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303BEB0 | 12_2_0303BEB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_03033572 | 12_2_03033572 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 12_2_0303B4F2 | 12_2_0303B4F2 |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 8.2.aVmZDnwW.exe.411c690.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 8.2.aVmZDnwW.exe.41c3878.5.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.44d29e8.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.44d29e8.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.file.exe.4408da8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.file.exe.4408da8.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.file.exe.4408da8.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 8.2.aVmZDnwW.exe.41c3878.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.aVmZDnwW.exe.41c3878.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 8.2.aVmZDnwW.exe.41c3878.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 8.2.aVmZDnwW.exe.411c690.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 8.2.aVmZDnwW.exe.411c690.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 8.2.aVmZDnwW.exe.411c690.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000007.00000002.2266573165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000007.00000002.2266573165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000008.00000002.2233081731.0000000004118000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000008.00000002.2233081731.0000000004118000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000000.00000002.2186804007.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.2186804007.0000000004263000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: file.exe PID: 3752, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: file.exe PID: 3752, type: MEMORYSTR | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: RegSvcs.exe PID: 7276, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: RegSvcs.exe PID: 7276, type: MEMORYSTR | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: aVmZDnwW.exe PID: 7328, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: aVmZDnwW.exe PID: 7328, type: MEMORYSTR | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: fastprox.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: ncobjapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mpclient.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wmitomi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\choice.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\choice.exe | Section loaded: version.dll | |
Source: 0.2.file.exe.4408da8.4.raw.unpack, QIPlbgwOxDNvtcBdQw.cs | High entropy of concatenated method names: 'FgHjqIT7DP', 'NAdjlbThCd', 'poij3weWBT', 'CA7jFlJe61', 'KbljYSJjil', 'FGGjoiZAYl', 'C2dj6wASdi', 'GvPjwY8xej', 'SQ2jrjWJFI', 'hASjnGUOq7' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, m2S1o1vvEKblSvSGBe.cs | High entropy of concatenated method names: 'UFoFIIEfPx', 'sGtFHaaRSV', 'Kf7F9IHW1C', 'f4HFvvIPFL', 'JSFFC1S71s', 'B8kFZaMGDh', 'beSFgAj268', 'dZvFdY0br2', 't6AFhHgfwu', 'kFyFSZeFJr' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, hCi7ubO39LUTUumiC2.cs | High entropy of concatenated method names: 'aGsoqQeYti', 'D40o3AYSLc', 'XTSoYVssZ7', 'vdQo6vjlZW', 'P2XowNbF2m', 'hw1Y0jNAsg', 'uTqYuw95hS', 'iOaYbUCd5T', 'FD0Y8GZyfc', 'z3kYeriexH' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, F7WtHKJtQWTcou7oqS.cs | High entropy of concatenated method names: 'zlkYKRGMFW', 'vCTYxclDRU', 'zliFGYb0Ca', 'EX5FfKKxBf', 'WYgFBeJGRk', 'i8hFmCRSMA', 'Is7FQ5SmEp', 'GOtFMtvfcM', 'aMBF5ffXFu', 'fEEFTkV3I1' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, K8KxjfXRQcRipaOAt1H.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IbU2h4AAj8', 'JUG2S4pEEl', 'Ssj2tN2LPF', 'jHR22dWReo', 'kdT2yecrfG', 'NBt21hRB90', 'nv32pZ8UyK' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, lMtam3cA0yx1dQi5MF.cs | High entropy of concatenated method names: 'eSQN9VWtZ9', 'Wt8Nvo3riO', 'QyeNORQHUT', 'XyyNAx5Z0r', 'cswNfet3MF', 'Eg4NBQZYbV', 'pQ2NQdHKvm', 'rQGNMmUAgA', 'PaCNT67THm', 'buwNseurBL' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, Cp8HAELrj1ru5cEc6O.cs | High entropy of concatenated method names: 'qSCERfokx', 'M9pI8ug8n', 'a7tHe7eB5', 'HmuxiCk35', 'h2WvlFy3i', 't7cJ0KD2U', 'ykvAxEfyIhf6nM1lO3', 'JumTCBQANw3kyKk8eZ', 'h9ldwIquQ', 'cEbSR3oAa' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, JQTcVuRCfs6Kyxwn2i.cs | High entropy of concatenated method names: 'BXxX6346ht', 'i1xXwxbI8G', 'wvEXnKblSv', 'sGBXaeO7Wt', 'V7oXCqSFCi', 'YubXZ39LUT', 'hjoPJNUI8LgHRUX1Sf', 'PKHpVwl7nZslLrZk2Z', 'BxcXXNK2B6', 'eSkXja6w70' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, QMCIaMbg5s4A5F1Ftw.cs | High entropy of concatenated method names: 'JsMhCZ3ASZ', 'nY3hg7ifVC', 'AJNhhNpMgh', 'espht4jQVf', 'XUJhyLwe6O', 'i3LhpeS0DN', 'Dispose', 'tODdlodraT', 'yZ9d35MWln', 'CHZdFAZsN7' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, unhoQLuGpTXrEEiGIk.cs | High entropy of concatenated method names: 'cXCg8msucl', 'fTHg76MESs', 'OTod4giy9o', 'RYidX639aa', 'yBbgs2WkNi', 'd7WgDMDSgp', 'TGQgc9XmKF', 'zLegPjiUoH', 'ikRgiT9ftb', 'n8egWnj65t' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, HNmOmBX4eBFQGadRm6t.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'roZSsLWKKp', 'gCkSDUi03v', 'uD5ScHsJeH', 'mSiSPpP7iB', 'XnLSi2TXUF', 'XFaSWAplPv', 'MUQSkQAXoI' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, C346ht9Y1xxbI8GhL8.cs | High entropy of concatenated method names: 'bCK3Pbjhoe', 'rZr3iBwu8M', 'aXC3WcHmrl', 'l1v3k8MBo3', 'QiP30FCTAA', 'DAM3uNi0Am', 'wiJ3bm2jeq', 'dol38ifPOB', 'xPn3eyDSjm', 'DpE374u0ca' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, Kp03lmQWNmpMfpEna0.cs | High entropy of concatenated method names: 'WFA6lo3bkq', 'JvO6FELjmU', 'vja6oEt7qD', 'hlZo7EGTdD', 'ViXozDDEtf', 'XlU64mlVl9', 'klW6XQemcW', 'NWt6LApok1', 'lNm6j5YOxs', 'Vcn6RQgJKb' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, HuOdfZXXU5PqKvLGHXp.cs | High entropy of concatenated method names: 'bVHS7sh7Lv', 'GD6SzMu4U3', 'hivt409Ux1', 'or9tXhLiY7', 'N5ftL3gCbL', 'wnftjRqJDM', 'sFgtRxN5Wa', 'BWLtqKpAFE', 'TkEtleIFfp', 'wHjt3xoSWt' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, L8KxqU5Z5chxFVN1Ct.cs | High entropy of concatenated method names: 'nm06VZFlIh', 'aiJ6UIZRED', 'YyS6EdPQoe', 'eks6ITBoJV', 'Tk66KyWuu5', 'Vcc6HqYGk8', 'jSC6xGREjL', 'pRJ69rymKM', 'Pt06v2IuXL', 'iwX6Jts740' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, Urbt7oFB2bKwG3VRLj.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'wstLe855n3', 'BZKL7vbiSQ', 'Xw5LzqdBtP', 'zGoj4lvhHZ', 'h5djXXkGqS', 'KKxjLg8HsZ', 'uAIjjOUdWR', 'CPZYrmCimk66nMov6IB' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, QZVcKReRAumOGuY0EA.cs | High entropy of concatenated method names: 'EOchOjH0KR', 'wqHhAbCDgl', 'jYEhGO8eyA', 'Hdqhfn7ckw', 'P4dhBqtvrk', 'QethmQ9lbW', 'mCAhQoTlN6', 'dYNhMmV4Cl', 'CcJh5Y6xaC', 'IIThTUJecZ' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, x7bpfQ7AV1lU9lutB4.cs | High entropy of concatenated method names: 'DOcSFQPQ8u', 'X43SYq0OJj', 'ihrSoj8id0', 'fq8S681Psy', 'MvdShNFQ2i', 'xfWSweC6Py', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, UWDZo0zBYX4HeHS04i.cs | High entropy of concatenated method names: 'YCOSHOAOOh', 'jFAS96f3Tm', 'iBLSvX2CRq', 'pY7SOxsnYk', 'KdhSAfPAXO', 'eOWSfMEXid', 'f7NSBAwYKY', 'qtfSp6WGND', 'FlRSVI9HBl', 'JrGSUwSwVg' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, NQDUis3aDFjfNFfLCL.cs | High entropy of concatenated method names: 'Dispose', 'O4AXe5F1Ft', 'TtQLAWx8Cw', 'gGHrJHMGoe', 'kVyX7L0Kql', 'sF6XzhS3Au', 'ProcessDialogKey', 'g7PL4ZVcKR', 'dAuLXmOGuY', 'UEALLp7bpf' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, grbhcskJK8fq6kUfDJ.cs | High entropy of concatenated method names: 'fPxgnJS4hu', 'UHagasiPUR', 'ToString', 'lPeglU7aff', 'poFg3e5Vd5', 'OdIgFjUxJ9', 'T2DgYewGuF', 'yphgoFgUS2', 'keUg6L52C4', 'bNJgwELrlP' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, LL0pDnWLwxJhYsmNZi.cs | High entropy of concatenated method names: 'ToString', 'EFxZsprHOs', 'WldZAKTEVo', 'qDiZGtoumO', 'XY4ZfO1Rc3', 'JCJZBTFEWq', 'pVFZmjyVxs', 'I82ZQvLIfk', 'qciZMcdbUE', 'fKPZ5TOetE' |
Source: 0.2.file.exe.4408da8.4.raw.unpack, PdOKg2Pfglta4gw7b6.cs | High entropy of concatenated method names: 'vJpCT8iCCu', 'k18CDOa7tb', 'qB1CPTPiOL', 'T9LCiAPxfo', 'rXaCA7nDSp', 'zkqCGMvyJT', 'AYiCfHWQC9', 'y5YCBi2TmD', 'PugCm7BARt', 'jyrCQbxmno' |
Source: 0.2.file.exe.a400000.6.raw.unpack, QIPlbgwOxDNvtcBdQw.cs | High entropy of concatenated method names: 'FgHjqIT7DP', 'NAdjlbThCd', 'poij3weWBT', 'CA7jFlJe61', 'KbljYSJjil', 'FGGjoiZAYl', 'C2dj6wASdi', 'GvPjwY8xej', 'SQ2jrjWJFI', 'hASjnGUOq7' |
Source: 0.2.file.exe.a400000.6.raw.unpack, m2S1o1vvEKblSvSGBe.cs | High entropy of concatenated method names: 'UFoFIIEfPx', 'sGtFHaaRSV', 'Kf7F9IHW1C', 'f4HFvvIPFL', 'JSFFC1S71s', 'B8kFZaMGDh', 'beSFgAj268', 'dZvFdY0br2', 't6AFhHgfwu', 'kFyFSZeFJr' |
Source: 0.2.file.exe.a400000.6.raw.unpack, hCi7ubO39LUTUumiC2.cs | High entropy of concatenated method names: 'aGsoqQeYti', 'D40o3AYSLc', 'XTSoYVssZ7', 'vdQo6vjlZW', 'P2XowNbF2m', 'hw1Y0jNAsg', 'uTqYuw95hS', 'iOaYbUCd5T', 'FD0Y8GZyfc', 'z3kYeriexH' |
Source: 0.2.file.exe.a400000.6.raw.unpack, F7WtHKJtQWTcou7oqS.cs | High entropy of concatenated method names: 'zlkYKRGMFW', 'vCTYxclDRU', 'zliFGYb0Ca', 'EX5FfKKxBf', 'WYgFBeJGRk', 'i8hFmCRSMA', 'Is7FQ5SmEp', 'GOtFMtvfcM', 'aMBF5ffXFu', 'fEEFTkV3I1' |
Source: 0.2.file.exe.a400000.6.raw.unpack, K8KxjfXRQcRipaOAt1H.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IbU2h4AAj8', 'JUG2S4pEEl', 'Ssj2tN2LPF', 'jHR22dWReo', 'kdT2yecrfG', 'NBt21hRB90', 'nv32pZ8UyK' |
Source: 0.2.file.exe.a400000.6.raw.unpack, lMtam3cA0yx1dQi5MF.cs | High entropy of concatenated method names: 'eSQN9VWtZ9', 'Wt8Nvo3riO', 'QyeNORQHUT', 'XyyNAx5Z0r', 'cswNfet3MF', 'Eg4NBQZYbV', 'pQ2NQdHKvm', 'rQGNMmUAgA', 'PaCNT67THm', 'buwNseurBL' |
Source: 0.2.file.exe.a400000.6.raw.unpack, Cp8HAELrj1ru5cEc6O.cs | High entropy of concatenated method names: 'qSCERfokx', 'M9pI8ug8n', 'a7tHe7eB5', 'HmuxiCk35', 'h2WvlFy3i', 't7cJ0KD2U', 'ykvAxEfyIhf6nM1lO3', 'JumTCBQANw3kyKk8eZ', 'h9ldwIquQ', 'cEbSR3oAa' |
Source: 0.2.file.exe.a400000.6.raw.unpack, JQTcVuRCfs6Kyxwn2i.cs | High entropy of concatenated method names: 'BXxX6346ht', 'i1xXwxbI8G', 'wvEXnKblSv', 'sGBXaeO7Wt', 'V7oXCqSFCi', 'YubXZ39LUT', 'hjoPJNUI8LgHRUX1Sf', 'PKHpVwl7nZslLrZk2Z', 'BxcXXNK2B6', 'eSkXja6w70' |
Source: 0.2.file.exe.a400000.6.raw.unpack, QMCIaMbg5s4A5F1Ftw.cs | High entropy of concatenated method names: 'JsMhCZ3ASZ', 'nY3hg7ifVC', 'AJNhhNpMgh', 'espht4jQVf', 'XUJhyLwe6O', 'i3LhpeS0DN', 'Dispose', 'tODdlodraT', 'yZ9d35MWln', 'CHZdFAZsN7' |
Source: 0.2.file.exe.a400000.6.raw.unpack, unhoQLuGpTXrEEiGIk.cs | High entropy of concatenated method names: 'cXCg8msucl', 'fTHg76MESs', 'OTod4giy9o', 'RYidX639aa', 'yBbgs2WkNi', 'd7WgDMDSgp', 'TGQgc9XmKF', 'zLegPjiUoH', 'ikRgiT9ftb', 'n8egWnj65t' |
Source: 0.2.file.exe.a400000.6.raw.unpack, HNmOmBX4eBFQGadRm6t.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'roZSsLWKKp', 'gCkSDUi03v', 'uD5ScHsJeH', 'mSiSPpP7iB', 'XnLSi2TXUF', 'XFaSWAplPv', 'MUQSkQAXoI' |
Source: 0.2.file.exe.a400000.6.raw.unpack, C346ht9Y1xxbI8GhL8.cs | High entropy of concatenated method names: 'bCK3Pbjhoe', 'rZr3iBwu8M', 'aXC3WcHmrl', 'l1v3k8MBo3', 'QiP30FCTAA', 'DAM3uNi0Am', 'wiJ3bm2jeq', 'dol38ifPOB', 'xPn3eyDSjm', 'DpE374u0ca' |
Source: 0.2.file.exe.a400000.6.raw.unpack, Kp03lmQWNmpMfpEna0.cs | High entropy of concatenated method names: 'WFA6lo3bkq', 'JvO6FELjmU', 'vja6oEt7qD', 'hlZo7EGTdD', 'ViXozDDEtf', 'XlU64mlVl9', 'klW6XQemcW', 'NWt6LApok1', 'lNm6j5YOxs', 'Vcn6RQgJKb' |
Source: 0.2.file.exe.a400000.6.raw.unpack, HuOdfZXXU5PqKvLGHXp.cs | High entropy of concatenated method names: 'bVHS7sh7Lv', 'GD6SzMu4U3', 'hivt409Ux1', 'or9tXhLiY7', 'N5ftL3gCbL', 'wnftjRqJDM', 'sFgtRxN5Wa', 'BWLtqKpAFE', 'TkEtleIFfp', 'wHjt3xoSWt' |
Source: 0.2.file.exe.a400000.6.raw.unpack, L8KxqU5Z5chxFVN1Ct.cs | High entropy of concatenated method names: 'nm06VZFlIh', 'aiJ6UIZRED', 'YyS6EdPQoe', 'eks6ITBoJV', 'Tk66KyWuu5', 'Vcc6HqYGk8', 'jSC6xGREjL', 'pRJ69rymKM', 'Pt06v2IuXL', 'iwX6Jts740' |
Source: 0.2.file.exe.a400000.6.raw.unpack, Urbt7oFB2bKwG3VRLj.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'wstLe855n3', 'BZKL7vbiSQ', 'Xw5LzqdBtP', 'zGoj4lvhHZ', 'h5djXXkGqS', 'KKxjLg8HsZ', 'uAIjjOUdWR', 'CPZYrmCimk66nMov6IB' |
Source: 0.2.file.exe.a400000.6.raw.unpack, QZVcKReRAumOGuY0EA.cs | High entropy of concatenated method names: 'EOchOjH0KR', 'wqHhAbCDgl', 'jYEhGO8eyA', 'Hdqhfn7ckw', 'P4dhBqtvrk', 'QethmQ9lbW', 'mCAhQoTlN6', 'dYNhMmV4Cl', 'CcJh5Y6xaC', 'IIThTUJecZ' |
Source: 0.2.file.exe.a400000.6.raw.unpack, x7bpfQ7AV1lU9lutB4.cs | High entropy of concatenated method names: 'DOcSFQPQ8u', 'X43SYq0OJj', 'ihrSoj8id0', 'fq8S681Psy', 'MvdShNFQ2i', 'xfWSweC6Py', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.file.exe.a400000.6.raw.unpack, UWDZo0zBYX4HeHS04i.cs | High entropy of concatenated method names: 'YCOSHOAOOh', 'jFAS96f3Tm', 'iBLSvX2CRq', 'pY7SOxsnYk', 'KdhSAfPAXO', 'eOWSfMEXid', 'f7NSBAwYKY', 'qtfSp6WGND', 'FlRSVI9HBl', 'JrGSUwSwVg' |
Source: 0.2.file.exe.a400000.6.raw.unpack, NQDUis3aDFjfNFfLCL.cs | High entropy of concatenated method names: 'Dispose', 'O4AXe5F1Ft', 'TtQLAWx8Cw', 'gGHrJHMGoe', 'kVyX7L0Kql', 'sF6XzhS3Au', 'ProcessDialogKey', 'g7PL4ZVcKR', 'dAuLXmOGuY', 'UEALLp7bpf' |
Source: 0.2.file.exe.a400000.6.raw.unpack, grbhcskJK8fq6kUfDJ.cs | High entropy of concatenated method names: 'fPxgnJS4hu', 'UHagasiPUR', 'ToString', 'lPeglU7aff', 'poFg3e5Vd5', 'OdIgFjUxJ9', 'T2DgYewGuF', 'yphgoFgUS2', 'keUg6L52C4', 'bNJgwELrlP' |
Source: 0.2.file.exe.a400000.6.raw.unpack, LL0pDnWLwxJhYsmNZi.cs | High entropy of concatenated method names: 'ToString', 'EFxZsprHOs', 'WldZAKTEVo', 'qDiZGtoumO', 'XY4ZfO1Rc3', 'JCJZBTFEWq', 'pVFZmjyVxs', 'I82ZQvLIfk', 'qciZMcdbUE', 'fKPZ5TOetE' |
Source: 0.2.file.exe.a400000.6.raw.unpack, PdOKg2Pfglta4gw7b6.cs | High entropy of concatenated method names: 'vJpCT8iCCu', 'k18CDOa7tb', 'qB1CPTPiOL', 'T9LCiAPxfo', 'rXaCA7nDSp', 'zkqCGMvyJT', 'AYiCfHWQC9', 'y5YCBi2TmD', 'PugCm7BARt', 'jyrCQbxmno' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, QIPlbgwOxDNvtcBdQw.cs | High entropy of concatenated method names: 'FgHjqIT7DP', 'NAdjlbThCd', 'poij3weWBT', 'CA7jFlJe61', 'KbljYSJjil', 'FGGjoiZAYl', 'C2dj6wASdi', 'GvPjwY8xej', 'SQ2jrjWJFI', 'hASjnGUOq7' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, m2S1o1vvEKblSvSGBe.cs | High entropy of concatenated method names: 'UFoFIIEfPx', 'sGtFHaaRSV', 'Kf7F9IHW1C', 'f4HFvvIPFL', 'JSFFC1S71s', 'B8kFZaMGDh', 'beSFgAj268', 'dZvFdY0br2', 't6AFhHgfwu', 'kFyFSZeFJr' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, hCi7ubO39LUTUumiC2.cs | High entropy of concatenated method names: 'aGsoqQeYti', 'D40o3AYSLc', 'XTSoYVssZ7', 'vdQo6vjlZW', 'P2XowNbF2m', 'hw1Y0jNAsg', 'uTqYuw95hS', 'iOaYbUCd5T', 'FD0Y8GZyfc', 'z3kYeriexH' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, F7WtHKJtQWTcou7oqS.cs | High entropy of concatenated method names: 'zlkYKRGMFW', 'vCTYxclDRU', 'zliFGYb0Ca', 'EX5FfKKxBf', 'WYgFBeJGRk', 'i8hFmCRSMA', 'Is7FQ5SmEp', 'GOtFMtvfcM', 'aMBF5ffXFu', 'fEEFTkV3I1' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, K8KxjfXRQcRipaOAt1H.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IbU2h4AAj8', 'JUG2S4pEEl', 'Ssj2tN2LPF', 'jHR22dWReo', 'kdT2yecrfG', 'NBt21hRB90', 'nv32pZ8UyK' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, lMtam3cA0yx1dQi5MF.cs | High entropy of concatenated method names: 'eSQN9VWtZ9', 'Wt8Nvo3riO', 'QyeNORQHUT', 'XyyNAx5Z0r', 'cswNfet3MF', 'Eg4NBQZYbV', 'pQ2NQdHKvm', 'rQGNMmUAgA', 'PaCNT67THm', 'buwNseurBL' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, Cp8HAELrj1ru5cEc6O.cs | High entropy of concatenated method names: 'qSCERfokx', 'M9pI8ug8n', 'a7tHe7eB5', 'HmuxiCk35', 'h2WvlFy3i', 't7cJ0KD2U', 'ykvAxEfyIhf6nM1lO3', 'JumTCBQANw3kyKk8eZ', 'h9ldwIquQ', 'cEbSR3oAa' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, JQTcVuRCfs6Kyxwn2i.cs | High entropy of concatenated method names: 'BXxX6346ht', 'i1xXwxbI8G', 'wvEXnKblSv', 'sGBXaeO7Wt', 'V7oXCqSFCi', 'YubXZ39LUT', 'hjoPJNUI8LgHRUX1Sf', 'PKHpVwl7nZslLrZk2Z', 'BxcXXNK2B6', 'eSkXja6w70' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, QMCIaMbg5s4A5F1Ftw.cs | High entropy of concatenated method names: 'JsMhCZ3ASZ', 'nY3hg7ifVC', 'AJNhhNpMgh', 'espht4jQVf', 'XUJhyLwe6O', 'i3LhpeS0DN', 'Dispose', 'tODdlodraT', 'yZ9d35MWln', 'CHZdFAZsN7' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, unhoQLuGpTXrEEiGIk.cs | High entropy of concatenated method names: 'cXCg8msucl', 'fTHg76MESs', 'OTod4giy9o', 'RYidX639aa', 'yBbgs2WkNi', 'd7WgDMDSgp', 'TGQgc9XmKF', 'zLegPjiUoH', 'ikRgiT9ftb', 'n8egWnj65t' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, HNmOmBX4eBFQGadRm6t.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'roZSsLWKKp', 'gCkSDUi03v', 'uD5ScHsJeH', 'mSiSPpP7iB', 'XnLSi2TXUF', 'XFaSWAplPv', 'MUQSkQAXoI' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, C346ht9Y1xxbI8GhL8.cs | High entropy of concatenated method names: 'bCK3Pbjhoe', 'rZr3iBwu8M', 'aXC3WcHmrl', 'l1v3k8MBo3', 'QiP30FCTAA', 'DAM3uNi0Am', 'wiJ3bm2jeq', 'dol38ifPOB', 'xPn3eyDSjm', 'DpE374u0ca' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, Kp03lmQWNmpMfpEna0.cs | High entropy of concatenated method names: 'WFA6lo3bkq', 'JvO6FELjmU', 'vja6oEt7qD', 'hlZo7EGTdD', 'ViXozDDEtf', 'XlU64mlVl9', 'klW6XQemcW', 'NWt6LApok1', 'lNm6j5YOxs', 'Vcn6RQgJKb' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, HuOdfZXXU5PqKvLGHXp.cs | High entropy of concatenated method names: 'bVHS7sh7Lv', 'GD6SzMu4U3', 'hivt409Ux1', 'or9tXhLiY7', 'N5ftL3gCbL', 'wnftjRqJDM', 'sFgtRxN5Wa', 'BWLtqKpAFE', 'TkEtleIFfp', 'wHjt3xoSWt' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, L8KxqU5Z5chxFVN1Ct.cs | High entropy of concatenated method names: 'nm06VZFlIh', 'aiJ6UIZRED', 'YyS6EdPQoe', 'eks6ITBoJV', 'Tk66KyWuu5', 'Vcc6HqYGk8', 'jSC6xGREjL', 'pRJ69rymKM', 'Pt06v2IuXL', 'iwX6Jts740' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, Urbt7oFB2bKwG3VRLj.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'wstLe855n3', 'BZKL7vbiSQ', 'Xw5LzqdBtP', 'zGoj4lvhHZ', 'h5djXXkGqS', 'KKxjLg8HsZ', 'uAIjjOUdWR', 'CPZYrmCimk66nMov6IB' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, QZVcKReRAumOGuY0EA.cs | High entropy of concatenated method names: 'EOchOjH0KR', 'wqHhAbCDgl', 'jYEhGO8eyA', 'Hdqhfn7ckw', 'P4dhBqtvrk', 'QethmQ9lbW', 'mCAhQoTlN6', 'dYNhMmV4Cl', 'CcJh5Y6xaC', 'IIThTUJecZ' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, x7bpfQ7AV1lU9lutB4.cs | High entropy of concatenated method names: 'DOcSFQPQ8u', 'X43SYq0OJj', 'ihrSoj8id0', 'fq8S681Psy', 'MvdShNFQ2i', 'xfWSweC6Py', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, UWDZo0zBYX4HeHS04i.cs | High entropy of concatenated method names: 'YCOSHOAOOh', 'jFAS96f3Tm', 'iBLSvX2CRq', 'pY7SOxsnYk', 'KdhSAfPAXO', 'eOWSfMEXid', 'f7NSBAwYKY', 'qtfSp6WGND', 'FlRSVI9HBl', 'JrGSUwSwVg' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, NQDUis3aDFjfNFfLCL.cs | High entropy of concatenated method names: 'Dispose', 'O4AXe5F1Ft', 'TtQLAWx8Cw', 'gGHrJHMGoe', 'kVyX7L0Kql', 'sF6XzhS3Au', 'ProcessDialogKey', 'g7PL4ZVcKR', 'dAuLXmOGuY', 'UEALLp7bpf' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, grbhcskJK8fq6kUfDJ.cs | High entropy of concatenated method names: 'fPxgnJS4hu', 'UHagasiPUR', 'ToString', 'lPeglU7aff', 'poFg3e5Vd5', 'OdIgFjUxJ9', 'T2DgYewGuF', 'yphgoFgUS2', 'keUg6L52C4', 'bNJgwELrlP' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, LL0pDnWLwxJhYsmNZi.cs | High entropy of concatenated method names: 'ToString', 'EFxZsprHOs', 'WldZAKTEVo', 'qDiZGtoumO', 'XY4ZfO1Rc3', 'JCJZBTFEWq', 'pVFZmjyVxs', 'I82ZQvLIfk', 'qciZMcdbUE', 'fKPZ5TOetE' |
Source: 0.2.file.exe.446dbc8.2.raw.unpack, PdOKg2Pfglta4gw7b6.cs | High entropy of concatenated method names: 'vJpCT8iCCu', 'k18CDOa7tb', 'qB1CPTPiOL', 'T9LCiAPxfo', 'rXaCA7nDSp', 'zkqCGMvyJT', 'AYiCfHWQC9', 'y5YCBi2TmD', 'PugCm7BARt', 'jyrCQbxmno' |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599757 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599546 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599437 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599218 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599109 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598890 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598781 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598671 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598343 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598234 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598124 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598015 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597906 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597796 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597672 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597562 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597453 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597337 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597196 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597093 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596984 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596874 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596765 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596656 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596546 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596437 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596328 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596218 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596109 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595998 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595890 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595781 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595671 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595531 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595421 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595298 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595172 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595062 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594952 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594843 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594734 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594624 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594515 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 600000 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599890 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599748 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599638 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599520 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599399 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599280 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599169 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599050 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598922 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598812 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598594 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598469 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598359 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598250 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598140 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598031 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597922 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597812 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597594 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597484 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597375 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597265 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597156 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597046 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596937 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596828 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596719 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596609 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596500 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596390 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596281 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596171 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596062 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595953 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595833 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595587 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595469 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595359 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595250 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595140 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595031 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594922 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594812 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594593 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594484 | |
Source: C:\Users\user\Desktop\file.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599757 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599546 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599437 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599218 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599109 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599000 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598890 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598781 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598671 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598343 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598234 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598124 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598015 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597906 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597796 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597672 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597562 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597453 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597337 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597196 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597093 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596984 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596874 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596765 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596656 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596546 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596437 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596328 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596218 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596109 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595998 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595890 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595781 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595671 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595531 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595421 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595298 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595172 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595062 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594952 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594843 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594734 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594624 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594515 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 922337203685477 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 600000 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599890 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599748 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599638 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599520 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599399 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599280 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599169 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 599050 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598922 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598812 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598594 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598469 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598359 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598250 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598140 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 598031 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597922 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597812 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597594 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597484 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597375 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597265 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597156 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 597046 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596937 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596828 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596719 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596609 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596500 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596390 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596281 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596171 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 596062 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595953 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595833 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595587 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595469 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595359 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595250 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595140 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 595031 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594922 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594812 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594703 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594593 | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Thread delayed: delay time: 594484 | |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Users\user\Desktop\file.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Queries volume information: C:\Users\user\AppData\Roaming\aVmZDnwW.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\aVmZDnwW.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | |