Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003C445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_003C445A |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CC6D1 FindFirstFileW,FindClose, | 0_2_003CC6D1 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_003CC75C |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003CEF95 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003CF0F2 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003CF3F3 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003C37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003C37EF |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003C3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003C3B12 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003CBCBC |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091445A GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_0091445A |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091C6D1 FindFirstFileW,FindClose, | 1_2_0091C6D1 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 1_2_0091C75C |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0091EF95 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0091F0F2 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_0091F3F3 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_009137EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_009137EF |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_00913B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_00913B12 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_0091BCBC |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comd |
Source: RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comp |
Source: RegSvcs.exe, 00000002.00000002.3054315301.000000000281E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: RegSvcs.exe, 00000002.00000002.3054315301.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3054315301.0000000002803000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002C91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/d |
Source: palladiums.exe, 00000001.00000002.1865151003.0000000001F50000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000007.00000002.2033313050.0000000001D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3051944992.0000000000413000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.orgd |
Source: RegSvcs.exe, 00000008.00000002.3055936383.00000000061D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002851000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002851000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.orgd |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002803000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002C91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: palladiums.exe, 00000001.00000002.1865151003.0000000001F50000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000007.00000002.2033313050.0000000001D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3051944992.0000000000413000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id= |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: palladiums.exe, 00000001.00000002.1865151003.0000000001F50000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, palladiums.exe, 00000007.00000002.2033313050.0000000001D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3051944992.0000000000413000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: RegSvcs.exe, 00000002.00000002.3054315301.0000000002830000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3053661404.0000000002D10000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/d |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003ECABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_003ECABC |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0093CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 1_2_0093CABC |
Source: 1.2.palladiums.exe.1f50000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.palladiums.exe.1f50000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 7.2.palladiums.exe.1d80000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 7.2.palladiums.exe.1d80000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 1.2.palladiums.exe.1f50000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 1.2.palladiums.exe.1f50000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 7.2.palladiums.exe.1d80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 7.2.palladiums.exe.1d80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000007.00000002.2033313050.0000000001D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000007.00000002.2033313050.0000000001D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000001.00000002.1865151003.0000000001F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000001.00000002.1865151003.0000000001F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000002.00000002.3052022073.0000000000743000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: palladiums.exe PID: 7160, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: RegSvcs.exe PID: 6244, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: palladiums.exe PID: 6480, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: This is a third-party compiled AutoIt script. | 0_2_00363B3A |
Source: PK5pHX4Gu5.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: PK5pHX4Gu5.exe, 00000000.00000003.1832060986.0000000003A23000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_8d3b15c1-e |
Source: PK5pHX4Gu5.exe, 00000000.00000003.1832060986.0000000003A23000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_82a2e558-1 |
Source: PK5pHX4Gu5.exe, 00000000.00000002.1832823249.0000000000414000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_2c0c139c-d |
Source: PK5pHX4Gu5.exe, 00000000.00000002.1832823249.0000000000414000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_ee7f957d-9 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: This is a third-party compiled AutoIt script. | 1_2_008B3B3A |
Source: palladiums.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: palladiums.exe, 00000001.00000000.1832360579.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_8829d4c7-c |
Source: palladiums.exe, 00000001.00000000.1832360579.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_9157582a-b |
Source: palladiums.exe, 00000007.00000000.1985084308.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_65bd1266-7 |
Source: palladiums.exe, 00000007.00000000.1985084308.0000000000964000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_bd72089f-b |
Source: PK5pHX4Gu5.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_cc899bb9-9 |
Source: PK5pHX4Gu5.exe | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_290813a0-2 |
Source: palladiums.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_fe5b1184-3 |
Source: palladiums.exe.0.dr | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_a497be48-0 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0036E6A0 | 0_2_0036E6A0 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0038D975 | 0_2_0038D975 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0036FCE0 | 0_2_0036FCE0 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003821C5 | 0_2_003821C5 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003962D2 | 0_2_003962D2 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003E03DA | 0_2_003E03DA |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0039242E | 0_2_0039242E |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003825FA | 0_2_003825FA |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003BE616 | 0_2_003BE616 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003766E1 | 0_2_003766E1 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0039878F | 0_2_0039878F |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00378808 | 0_2_00378808 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003E0857 | 0_2_003E0857 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00396844 | 0_2_00396844 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003C8889 | 0_2_003C8889 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0038CB21 | 0_2_0038CB21 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00396DB6 | 0_2_00396DB6 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00376F9E | 0_2_00376F9E |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00373030 | 0_2_00373030 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00383187 | 0_2_00383187 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0038F1D9 | 0_2_0038F1D9 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00361287 | 0_2_00361287 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00381484 | 0_2_00381484 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00375520 | 0_2_00375520 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00387696 | 0_2_00387696 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00375760 | 0_2_00375760 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00381978 | 0_2_00381978 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00399AB5 | 0_2_00399AB5 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0038BDA6 | 0_2_0038BDA6 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00381D90 | 0_2_00381D90 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003E7DDB | 0_2_003E7DDB |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_0036DF00 | 0_2_0036DF00 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_00373FE0 | 0_2_00373FE0 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_011605B8 | 0_2_011605B8 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008BE6A0 | 1_2_008BE6A0 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008DD975 | 1_2_008DD975 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008BFCE0 | 1_2_008BFCE0 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008D21C5 | 1_2_008D21C5 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008E62D2 | 1_2_008E62D2 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_009303DA | 1_2_009303DA |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008E242E | 1_2_008E242E |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008D25FA | 1_2_008D25FA |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008C66E1 | 1_2_008C66E1 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0090E616 | 1_2_0090E616 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008E878F | 1_2_008E878F |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_00918889 | 1_2_00918889 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008C8808 | 1_2_008C8808 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_00930857 | 1_2_00930857 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008E6844 | 1_2_008E6844 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008DCB21 | 1_2_008DCB21 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008E6DB6 | 1_2_008E6DB6 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008C6F9E | 1_2_008C6F9E |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008C3030 | 1_2_008C3030 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008D3187 | 1_2_008D3187 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008DF1D9 | 1_2_008DF1D9 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008B1287 | 1_2_008B1287 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008D1484 | 1_2_008D1484 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008C5520 | 1_2_008C5520 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008D7696 | 1_2_008D7696 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008C5760 | 1_2_008C5760 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008D1978 | 1_2_008D1978 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008E9AB5 | 1_2_008E9AB5 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008D1D90 | 1_2_008D1D90 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008DBDA6 | 1_2_008DBDA6 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_00937DDB | 1_2_00937DDB |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008C3FE0 | 1_2_008C3FE0 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008BDF00 | 1_2_008BDF00 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_013B0568 | 1_2_013B0568 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D427B9 | 2_2_00D427B9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D42DD1 | 2_2_00D42DD1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D49E08 | 2_2_00D49E08 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4E220 | 2_2_00D4E220 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4E7F0 | 2_2_00D4E7F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4E7E0 | 2_2_00D4E7E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4EC48 | 2_2_00D4EC48 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4EC39 | 2_2_00D4EC39 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4F090 | 2_2_00D4F090 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4F0A0 | 2_2_00D4F0A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4F4F8 | 2_2_00D4F4F8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4F4E8 | 2_2_00D4F4E8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4F950 | 2_2_00D4F950 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D4F941 | 2_2_00D4F941 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 2_2_00D49BEC | 2_2_00D49BEC |
Source: 1.2.palladiums.exe.1f50000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.palladiums.exe.1f50000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 7.2.palladiums.exe.1d80000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 7.2.palladiums.exe.1d80000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.palladiums.exe.1f50000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 1.2.palladiums.exe.1f50000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 7.2.palladiums.exe.1d80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 7.2.palladiums.exe.1d80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000007.00000002.2033313050.0000000001D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000007.00000002.2033313050.0000000001D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000001.00000002.1865151003.0000000001F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000001.00000002.1865151003.0000000001F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.3052022073.0000000000743000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: palladiums.exe PID: 7160, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: RegSvcs.exe PID: 6244, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: palladiums.exe PID: 6480, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_003648D7 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003E5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_003E5376 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_008B48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 1_2_008B48D7 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_00935376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 1_2_00935376 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003C445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_003C445A |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CC6D1 FindFirstFileW,FindClose, | 0_2_003CC6D1 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_003CC75C |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003CEF95 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003CF0F2 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003CF3F3 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003C37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003C37EF |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003C3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003C3B12 |
Source: C:\Users\user\Desktop\PK5pHX4Gu5.exe | Code function: 0_2_003CBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003CBCBC |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091445A GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_0091445A |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091C6D1 FindFirstFileW,FindClose, | 1_2_0091C6D1 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 1_2_0091C75C |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0091EF95 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_0091F0F2 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_0091F3F3 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_009137EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_009137EF |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_00913B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_00913B12 |
Source: C:\Users\user\AppData\Local\biopsies\palladiums.exe | Code function: 1_2_0091BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_0091BCBC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |