Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 00E79731h | 4_2_00E79480 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 00E79E5Ah | 4_2_00E79A40 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 00E79E5Ah | 4_2_00E79A30 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 00E79E5Ah | 4_2_00E79D87 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E65E15h | 4_2_04E65AD8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E6F700h | 4_2_04E6F458 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E676D0h | 4_2_04E67428 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E68830h | 4_2_04E68588 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E647C9h | 4_2_04E64520 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E65929h | 4_2_04E65680 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E6E9F8h | 4_2_04E6E750 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E6F2A8h | 4_2_04E6F000 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E683D8h | 4_2_04E68130 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E6E5A0h | 4_2_04E6E2F8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E654D1h | 4_2_04E65228 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E67F80h | 4_2_04E67CD8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E65079h | 4_2_04E64DD0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E67278h | 4_2_04E66FD0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E6FB58h | 4_2_04E6F8B0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E67B28h | 4_2_04E67880 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E64C21h | 4_2_04E64978 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 04E6EE50h | 4_2_04E6EBA8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 054462B5h | 4_2_054460D8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05446C3Fh | 4_2_054460D8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 054418A0h | 4_2_054415F8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05443840h | 4_2_05443598 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 054426E0h | 4_2_05442438 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05440740h | 4_2_05440498 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 054449A0h | 4_2_054446F8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 054433E8h | 4_2_05443140 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then mov esp, ebp | 4_2_05449120 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then mov dword ptr [ebp-14h], 00000000h | 4_2_054451E8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05441448h | 4_2_054411A0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 054402E8h | 4_2_05440040 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05444548h | 4_2_054442A0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05440FF0h | 4_2_05440D48 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05442F90h | 4_2_05442CE8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 054440F0h | 4_2_05443E48 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05442152h | 4_2_05441EA8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05443C98h | 4_2_054439F0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05440B98h | 4_2_054408F0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05442B38h | 4_2_05442890 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05444DF8h | 4_2_05444B50 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4x nop then jmp 05441CF8h | 4_2_05441A50 |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comd |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.0000000002961000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/d |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1796395085.0000000004D69000.00000004.00000800.00020000.00000000.sdmp, 3qr7JBuNuX.exe, 00000004.00000002.3018038223.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.orgd |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.orgd |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1794545207.000000000395E000.00000004.00000800.00020000.00000000.sdmp, 3qr7JBuNuX.exe, 00000004.00000002.3020404812.0000000002961000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fonts.com |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.tiro.com |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.typography.netD |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1800718540.0000000009B62000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: 3qr7JBuNuX.exe | String found in binary or memory: https://api.libertyreserve.com/beta/xml/ |
Source: 3qr7JBuNuX.exe | String found in binary or memory: https://api.libertyreserve.com/beta/xml/accountname.aspx |
Source: 3qr7JBuNuX.exe | String found in binary or memory: https://api.libertyreserve.com/beta/xml/balance.aspx |
Source: 3qr7JBuNuX.exe | String found in binary or memory: https://api.libertyreserve.com/beta/xml/history.aspx |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1794545207.0000000003569000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.libertyreserve.com/beta/xml/history.aspxS |
Source: 3qr7JBuNuX.exe | String found in binary or memory: https://api.libertyreserve.com/beta/xml/transfer.aspx |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1796395085.0000000004D69000.00000004.00000800.00020000.00000000.sdmp, 3qr7JBuNuX.exe, 00000004.00000002.3018038223.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id= |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: 3qr7JBuNuX.exe, 00000000.00000002.1796395085.0000000004D69000.00000004.00000800.00020000.00000000.sdmp, 3qr7JBuNuX.exe, 00000004.00000002.3018038223.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d |
Source: 3qr7JBuNuX.exe, 00000004.00000002.3020404812.00000000029DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l |
Source: 3qr7JBuNuX.exe | String found in binary or memory: https://sci.libertyreserve.com/ |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_018C2290 | 0_2_018C2290 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_018C225B | 0_2_018C225B |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_018C08B3 | 0_2_018C08B3 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_018C134A | 0_2_018C134A |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A050B90 | 0_2_0A050B90 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A051E78 | 0_2_0A051E78 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A057F60 | 0_2_0A057F60 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A052CF8 | 0_2_0A052CF8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A051440 | 0_2_0A051440 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A059588 | 0_2_0A059588 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A050AF2 | 0_2_0A050AF2 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A053BC8 | 0_2_0A053BC8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A053BD8 | 0_2_0A053BD8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A052BE0 | 0_2_0A052BE0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A0518D9 | 0_2_0A0518D9 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A058950 | 0_2_0A058950 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A058960 | 0_2_0A058960 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A0539E0 | 0_2_0A0539E0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A059E88 | 0_2_0A059E88 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A054FD8 | 0_2_0A054FD8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A054FE8 | 0_2_0A054FE8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A052C10 | 0_2_0A052C10 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A058D11 | 0_2_0A058D11 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A054DD2 | 0_2_0A054DD2 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A054DE0 | 0_2_0A054DE0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A058222 | 0_2_0A058222 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A058228 | 0_2_0A058228 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A055268 | 0_2_0A055268 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A055278 | 0_2_0A055278 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A050006 | 0_2_0A050006 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A050040 | 0_2_0A050040 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A051620 | 0_2_0A051620 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A05A43A | 0_2_0A05A43A |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A055454 | 0_2_0A055454 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A055458 | 0_2_0A055458 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A058559 | 0_2_0A058559 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A058568 | 0_2_0A058568 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A060040 | 0_2_0A060040 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A06A53C | 0_2_0A06A53C |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A06B998 | 0_2_0A06B998 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A4F1070 | 0_2_0A4F1070 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A4F18D1 | 0_2_0A4F18D1 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A4F18E0 | 0_2_0A4F18E0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A4F2FB8 | 0_2_0A4F2FB8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A4F1498 | 0_2_0A4F1498 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A4F14A8 | 0_2_0A4F14A8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 0_2_0A4F1D18 | 0_2_0A4F1D18 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_00E7C530 | 4_2_00E7C530 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_00E727B9 | 4_2_00E727B9 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_00E72DD1 | 4_2_00E72DD1 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_00E79480 | 4_2_00E79480 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_00E7C521 | 4_2_00E7C521 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_00E7946F | 4_2_00E7946F |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E66138 | 4_2_04E66138 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E613A8 | 4_2_04E613A8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6BC50 | 4_2_04E6BC50 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6AE78 | 4_2_04E6AE78 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E689E0 | 4_2_04E689E0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E65AD8 | 4_2_04E65AD8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E60AB8 | 4_2_04E60AB8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6F455 | 4_2_04E6F455 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6F458 | 4_2_04E6F458 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E67423 | 4_2_04E67423 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E67428 | 4_2_04E67428 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E68588 | 4_2_04E68588 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E68579 | 4_2_04E68579 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E64520 | 4_2_04E64520 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6450F | 4_2_04E6450F |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E65680 | 4_2_04E65680 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E65670 | 4_2_04E65670 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6E740 | 4_2_04E6E740 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6E750 | 4_2_04E6E750 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6F000 | 4_2_04E6F000 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E68120 | 4_2_04E68120 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E66137 | 4_2_04E66137 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E68130 | 4_2_04E68130 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6E2F5 | 4_2_04E6E2F5 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6E2F8 | 4_2_04E6E2F8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E65228 | 4_2_04E65228 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6521B | 4_2_04E6521B |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E60320 | 4_2_04E60320 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E60330 | 4_2_04E60330 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E67CC8 | 4_2_04E67CC8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E60CD8 | 4_2_04E60CD8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E67CD8 | 4_2_04E67CD8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E63CA3 | 4_2_04E63CA3 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E64DC0 | 4_2_04E64DC0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E64DD0 | 4_2_04E64DD0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6EFFD | 4_2_04E6EFFD |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E66FCD | 4_2_04E66FCD |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E66FD0 | 4_2_04E66FD0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6F8A1 | 4_2_04E6F8A1 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6F8B0 | 4_2_04E6F8B0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E67880 | 4_2_04E67880 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E67871 | 4_2_04E67871 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E64969 | 4_2_04E64969 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E64978 | 4_2_04E64978 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E65ACB | 4_2_04E65ACB |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6EBA8 | 4_2_04E6EBA8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_04E6EB98 | 4_2_04E6EB98 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05448030 | 4_2_05448030 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054460D8 | 4_2_054460D8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05447390 | 4_2_05447390 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05446D48 | 4_2_05446D48 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054479E0 | 4_2_054479E0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054415E8 | 4_2_054415E8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054415F8 | 4_2_054415F8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05443597 | 4_2_05443597 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05443598 | 4_2_05443598 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05442427 | 4_2_05442427 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05442438 | 4_2_05442438 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05440488 | 4_2_05440488 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05440498 | 4_2_05440498 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054446E9 | 4_2_054446E9 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054446F8 | 4_2_054446F8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_0544869F | 4_2_0544869F |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054486B0 | 4_2_054486B0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05443140 | 4_2_05443140 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05443132 | 4_2_05443132 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054451D8 | 4_2_054451D8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054451E8 | 4_2_054451E8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05441190 | 4_2_05441190 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054411A0 | 4_2_054411A0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05440040 | 4_2_05440040 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05448023 | 4_2_05448023 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_0544003D | 4_2_0544003D |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054460C9 | 4_2_054460C9 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05447380 | 4_2_05447380 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05444290 | 4_2_05444290 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054442A0 | 4_2_054442A0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05440D48 | 4_2_05440D48 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05446D37 | 4_2_05446D37 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05440D39 | 4_2_05440D39 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05442CE7 | 4_2_05442CE7 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05442CE8 | 4_2_05442CE8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05443E45 | 4_2_05443E45 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05443E48 | 4_2_05443E48 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05441E9A | 4_2_05441E9A |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05441EA8 | 4_2_05441EA8 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054479D0 | 4_2_054479D0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054439E6 | 4_2_054439E6 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054439F0 | 4_2_054439F0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054408E1 | 4_2_054408E1 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_054408F0 | 4_2_054408F0 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05442880 | 4_2_05442880 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05442890 | 4_2_05442890 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05444B40 | 4_2_05444B40 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05444B50 | 4_2_05444B50 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05441A40 | 4_2_05441A40 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Code function: 4_2_05441A50 | 4_2_05441A50 |
Source: 4.2.3qr7JBuNuX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 4.2.3qr7JBuNuX.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.3qr7JBuNuX.exe.4dac598.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.3qr7JBuNuX.exe.4dac598.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.3qr7JBuNuX.exe.4d95b78.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.3qr7JBuNuX.exe.4d95b78.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.3qr7JBuNuX.exe.4dac598.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.3qr7JBuNuX.exe.4d95b78.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000004.00000002.3018038223.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1796395085.0000000004D69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: 3qr7JBuNuX.exe PID: 4828, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: 3qr7JBuNuX.exe PID: 1880, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: fastprox.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: ncobjapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mpclient.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wmitomi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Users\user\Desktop\3qr7JBuNuX.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Users\user\Desktop\3qr7JBuNuX.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3qr7JBuNuX.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |