Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002BC7000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://45.137.22.239:5 |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002B58000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://45.137.22.239:55615 |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://45.137.22.239:55615/ |
Source: VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D91000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://45.137.22.239:55615t- |
Source: PzPxqbK89H.exe, VzwumYUBCtHW.exe.0.dr |
String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: PzPxqbK89H.exe, VzwumYUBCtHW.exe.0.dr |
String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: PzPxqbK89H.exe, VzwumYUBCtHW.exe.0.dr |
String found in binary or memory: http://ocsp.comodoca.com0 |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002B58000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D91000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.datacontract.org/2004/07/ |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: PzPxqbK89H.exe, 00000000.00000002.1735276217.000000000344C000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000A.00000002.1837857971.00000000024DC000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002E80000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/ |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/0 |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/CheckConnect |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D50000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse |
Source: VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D50000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D79000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002E80000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/GetUpdates |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse |
Source: VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/SetEnviron |
Source: VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.carterandcone.coml |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers? |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designersG |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fonts.com |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.goodfont.co.kr |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sajatypeworks.com |
Source: PzPxqbK89H.exe, 00000000.00000002.1739279048.0000000005D20000.00000004.00000020.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sakkal.com |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sandoll.co.kr |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.tiro.com |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.typography.netD |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.urwpp.deDPlease |
Source: PzPxqbK89H.exe, 00000000.00000002.1741145912.0000000007552000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.zhongyicts.com.cn |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A60000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D50000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb |
Source: PzPxqbK89H.exe, 00000008.00000002.1857545364.0000000002A60000.00000004.00000800.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000E.00000002.1946573671.0000000002D50000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/geoip |
Source: PzPxqbK89H.exe, 00000000.00000002.1735860178.0000000004429000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000000.00000002.1735860178.00000000044FD000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000008.00000002.1852775937.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000A.00000002.1839480666.000000000358E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE% |
Source: PzPxqbK89H.exe, 00000000.00000002.1735860178.0000000004429000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000000.00000002.1735860178.00000000044FD000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000008.00000002.1852775937.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000A.00000002.1839480666.000000000358E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: PzPxqbK89H.exe, 00000000.00000002.1735860178.0000000004429000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000000.00000002.1735860178.00000000044FD000.00000004.00000800.00020000.00000000.sdmp, PzPxqbK89H.exe, 00000008.00000002.1852775937.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VzwumYUBCtHW.exe, 0000000A.00000002.1839480666.000000000358E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ipinfo.io/ip%appdata% |
Source: PzPxqbK89H.exe, VzwumYUBCtHW.exe.0.dr |
String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: tmpD5CE.tmp.8.dr, tmp8899.tmp.14.dr, tmpD5F1.tmp.8.dr, tmp9D77.tmp.8.dr, tmp8898.tmp.14.dr, tmpD5E0.tmp.8.dr, tmp8866.tmp.14.dr, tmp8854.tmp.14.dr, tmpC132.tmp.14.dr, tmp9D56.tmp.8.dr, tmp8887.tmp.14.dr, tmpD602.tmp.8.dr, tmp9D45.tmp.8.dr, tmp8876.tmp.14.dr, tmp9D67.tmp.8.dr, tmpC111.tmp.14.dr, tmpD5CF.tmp.8.dr, tmp9D24.tmp.8.dr, tmp9D35.tmp.8.dr, tmpD5F0.tmp.8.dr, tmpC100.tmp.14.dr |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: microsoft.management.infrastructure.native.unmanaged.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wmidcom.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: microsoft.management.infrastructure.native.unmanaged.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wmidcom.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: taskschd.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: mscoree.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: vcruntime140_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: dwrite.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: windowscodecs.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: propsys.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: edputil.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: urlmon.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: iertutil.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: srvcli.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: netutils.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: windows.staterepositoryps.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: appresolver.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: bcp47langs.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: slc.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: sppc.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: onecorecommonproxystub.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: onecoreuapcommonproxystub.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: fastprox.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: ncobjapi.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mpclient.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wmitomi.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mi.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
|
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: gpapi.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: taskschd.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: mscoree.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: vcruntime140_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: rasapi32.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: rasman.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: rtutils.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: dhcpcsvc6.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: dhcpcsvc.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: secur32.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: ntmarta.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Section loaded: windowscodecs.dll |
|
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, jVTKibClZivvWCFDO5.cs |
High entropy of concatenated method names: 'QdE29mnWLD', 'dkG2xS2GSn', 'nnx2dJaKh7', 'yq02jmswHw', 'BqZ2yXYPnB', 'qad2NLcFTr', 'WUrbBnkwnFVWmuqO0H', 'VbQ0HJenl480HmEE0k', 'cpE22SP9Uw', 'NDK2gfl0HW' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, FnBXadwLcFTr7T1Qgj.cs |
High entropy of concatenated method names: 'IJTbojhh3J', 'Tvsb0dENuZ', 'CVibuigBM3', 'a2ab9ccfGu', 'rMQbxf6yOV', 'apOu72TK9k', 'y9AufTViFj', 'VNyuinkisy', 'pJHu4PRdyp', 'QTBuvAWXg1' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, rmnWLDrgkGS2GSn6Lw.cs |
High entropy of concatenated method names: 'qlj0h0yjBg', 'VN10SD6bSc', 'tyc0BMqAcX', 'nXA08xLolD', 'ftg07PjB8k', 'XQU0fXpuHR', 'o6V0i7hJVd', 'yGs047gMJi', 'fCN0vAVFJq', 'VIJ0H6Dhhg' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, HPlWakIhjgTZWRLUf0.cs |
High entropy of concatenated method names: 'aPderi7KUL', 'KfIeDvPHkk', 'kEXewlZ0Xe', 'tiSeQ9f5nb', 'nbve3CCetu', 'b3ne1NGfEi', 'udkeUjHsEU', 'YgOeV2j9w9', 'Pg0eLM37Sc', 'GPoemAOyjO' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, DwI7glUTkpFXdbFb5c.cs |
High entropy of concatenated method names: 'deL95PPb3B', 'gO096yblX6', 'xpE9budRJ3', 'JAmbHCpny6', 'dtWbzGn24b', 'DgJ9YiABYV', 'moI92eMTbp', 'w6w9JvL1vY', 'YVk9gElSWs', 'N8Q9CrFpVV' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, nAqk6E2YtO49DXa3o1V.cs |
High entropy of concatenated method names: 'Mr8TcoHoHp', 'JLXTkeQ3Dk', 'MdpTnSBCd3', 'BOeTKLW57W', 'AjZTAqAgrL', 'M3ATtb9gRa', 'Rm1Ts9qZYT', 'LHVTr1Jjsc', 'rWQTDNeewu', 'dqWTPMe6d9' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, CwHwJwPKnG270AqZXY.cs |
High entropy of concatenated method names: 'vxAuAhh4r4', 'cJ6usoQu1E', 'K8w6OeXlaM', 'a0k63oHRwZ', 'qg761CuN0B', 'evw6GaOoEQ', 'O4W6UNMB1H', 'FxK6VtPmUV', 'kgE6FLnuYK', 'KPN6LMdqLG' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, ELRVVHvbDskkQkHGid.cs |
High entropy of concatenated method names: 'W43EwuiHpj', 'GaDEQVCrlM', 'OufEOkhknY', 'tu2E3stKTC', 'vylEh7WdeE', 'hWnE1oUpGQ', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, uB9MfxH0bndo5Grgpb.cs |
High entropy of concatenated method names: 'oxaT24UN1D', 'UwYTgr2Sjx', 'IADTCZOMhR', 'FabT5CA0G8', 'Q5cT0rdT1N', 'RLFTuFqQgF', 'P2HTb1KvGD', 'XcNEi8Nx5m', 'HnpE4bRBSY', 's6WEvNKQM1' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, GGVhu4FVl0LolwcnLO.cs |
High entropy of concatenated method names: 'Mxb9cVsp2p', 'G2J9k9375m', 'yCD9ncg7mJ', 'Y9C9Ks3J3b', 'sSY9A22Ccr', 'bCk9tJkIPY', 'EAB9sAOIvi', 'Jwp9rtCLsA', 'kjp9D3QZex', 'sX69PV9nmp' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, TDwrK4xy1eTvVE6hUY.cs |
High entropy of concatenated method names: 'wEigoMxmRB', 'BDeg5yHDSB', 'xk6g0rCoIZ', 'Vkvg6IaI0J', 'NxCguM9MDP', 'TTAgbTf2HN', 'DYvg9kXsWp', 'pslgx27miv', 'CPggWhqAs8', 'HHigdpqagB' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, HsrGlV44lLvBViRtCU.cs |
High entropy of concatenated method names: 'eEmE56mcv1', 'nCcE0PNAC9', 'mQEE642m7M', 'aPREuwNgC0', 'N13EbNgWF6', 'AlVE99oDp3', 'OVHExraLc9', 'J2CEWo5ut6', 'tPXEd9opBA', 'rvWEj9Bq0v' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, hxdbkFBDOG3GYXCC6J.cs |
High entropy of concatenated method names: 'ToString', 'DaONmYJpON', 'MDANQnT1CQ', 'TkmNOPPjen', 'MBFN3pLBEP', 'PIQN1Mdar1', 'H8yNGy95LZ', 'My5NU5Dp2c', 'jgrNV8sswV', 'VVZNF6iToB' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, ojhQbu8XUN2SA1YWIn.cs |
High entropy of concatenated method names: 'ptiXdpFyiC', 's37XjtV83R', 'ToString', 'UIaX5RQAAE', 'Y07X0EIxO1', 'OWYX6yiegV', 'zywXuiKGYY', 'qPqXb31ZK6', 'y5TX9ajlLV', 'uQVXx9Js1b' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, W031NeDnxJaKh7kq0m.cs |
High entropy of concatenated method names: 'm0P6KnjpwJ', 'C1R6tybQc5', 'LRj6ruwArP', 't4E6DnRvqG', 'dxy6y3GhN4', 'Ped6NEv4mA', 'yGy6XRLMF3', 'fuO6ER3fS5', 'c9n6TktAQC', 'S166pZnbNT' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, W92IZu2gnM5iBLPmiS8.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Q0Bphobp2C', 'PrgpS09pe0', 'IJLpBdNisU', 'CWLp8k7pEs', 'JSCp7bI3Sh', 'fhmpfmo0TT', 'K1vpijpUCc' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, Y9DXAaJuhWSHPRE4Ex.cs |
High entropy of concatenated method names: 'w7YnMSgLC', 'D77Kk0FlJ', 'b96tmiT1r', 'H9msNbxGx', 'oiuDitd3m', 'v7vPg1b0Q', 'CqDeN6rErw82KPCB7j', 'YoK4FpWP4uIsWkNfxA', 'Lncefsw3BuGyDbf5bV', 'UbpEm1p7Q' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, EUgWJP05fVsWnH2ls3.cs |
High entropy of concatenated method names: 'Dispose', 'KXH2v1bafu', 'R6UJQQxDqV', 'yygxxteD6Y', 'JQs2HrGlV4', 'tLv2zBViRt', 'ProcessDialogKey', 'dUDJYLRVVH', 'iDsJ2kkQkH', 'KidJJZB9Mf' |
Source: 0.2.PzPxqbK89H.exe.4463190.4.raw.unpack, fhbI0kfI6Vya1Km65c.cs |
High entropy of concatenated method names: 'KK9X4GeJ2k', 'K3wXHpC4LI', 'ADgEYnsshE', 'wAXE2hFIS8', 'ReVXm8baBj', 'vxXXabE2Jb', 'gUkXI7HqcD', 'hwoXh0uHl2', 'k9cXSYS54C', 'VSFXBrx37r' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, jVTKibClZivvWCFDO5.cs |
High entropy of concatenated method names: 'QdE29mnWLD', 'dkG2xS2GSn', 'nnx2dJaKh7', 'yq02jmswHw', 'BqZ2yXYPnB', 'qad2NLcFTr', 'WUrbBnkwnFVWmuqO0H', 'VbQ0HJenl480HmEE0k', 'cpE22SP9Uw', 'NDK2gfl0HW' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, FnBXadwLcFTr7T1Qgj.cs |
High entropy of concatenated method names: 'IJTbojhh3J', 'Tvsb0dENuZ', 'CVibuigBM3', 'a2ab9ccfGu', 'rMQbxf6yOV', 'apOu72TK9k', 'y9AufTViFj', 'VNyuinkisy', 'pJHu4PRdyp', 'QTBuvAWXg1' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, rmnWLDrgkGS2GSn6Lw.cs |
High entropy of concatenated method names: 'qlj0h0yjBg', 'VN10SD6bSc', 'tyc0BMqAcX', 'nXA08xLolD', 'ftg07PjB8k', 'XQU0fXpuHR', 'o6V0i7hJVd', 'yGs047gMJi', 'fCN0vAVFJq', 'VIJ0H6Dhhg' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, HPlWakIhjgTZWRLUf0.cs |
High entropy of concatenated method names: 'aPderi7KUL', 'KfIeDvPHkk', 'kEXewlZ0Xe', 'tiSeQ9f5nb', 'nbve3CCetu', 'b3ne1NGfEi', 'udkeUjHsEU', 'YgOeV2j9w9', 'Pg0eLM37Sc', 'GPoemAOyjO' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, DwI7glUTkpFXdbFb5c.cs |
High entropy of concatenated method names: 'deL95PPb3B', 'gO096yblX6', 'xpE9budRJ3', 'JAmbHCpny6', 'dtWbzGn24b', 'DgJ9YiABYV', 'moI92eMTbp', 'w6w9JvL1vY', 'YVk9gElSWs', 'N8Q9CrFpVV' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, nAqk6E2YtO49DXa3o1V.cs |
High entropy of concatenated method names: 'Mr8TcoHoHp', 'JLXTkeQ3Dk', 'MdpTnSBCd3', 'BOeTKLW57W', 'AjZTAqAgrL', 'M3ATtb9gRa', 'Rm1Ts9qZYT', 'LHVTr1Jjsc', 'rWQTDNeewu', 'dqWTPMe6d9' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, CwHwJwPKnG270AqZXY.cs |
High entropy of concatenated method names: 'vxAuAhh4r4', 'cJ6usoQu1E', 'K8w6OeXlaM', 'a0k63oHRwZ', 'qg761CuN0B', 'evw6GaOoEQ', 'O4W6UNMB1H', 'FxK6VtPmUV', 'kgE6FLnuYK', 'KPN6LMdqLG' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, ELRVVHvbDskkQkHGid.cs |
High entropy of concatenated method names: 'W43EwuiHpj', 'GaDEQVCrlM', 'OufEOkhknY', 'tu2E3stKTC', 'vylEh7WdeE', 'hWnE1oUpGQ', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, uB9MfxH0bndo5Grgpb.cs |
High entropy of concatenated method names: 'oxaT24UN1D', 'UwYTgr2Sjx', 'IADTCZOMhR', 'FabT5CA0G8', 'Q5cT0rdT1N', 'RLFTuFqQgF', 'P2HTb1KvGD', 'XcNEi8Nx5m', 'HnpE4bRBSY', 's6WEvNKQM1' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, GGVhu4FVl0LolwcnLO.cs |
High entropy of concatenated method names: 'Mxb9cVsp2p', 'G2J9k9375m', 'yCD9ncg7mJ', 'Y9C9Ks3J3b', 'sSY9A22Ccr', 'bCk9tJkIPY', 'EAB9sAOIvi', 'Jwp9rtCLsA', 'kjp9D3QZex', 'sX69PV9nmp' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, TDwrK4xy1eTvVE6hUY.cs |
High entropy of concatenated method names: 'wEigoMxmRB', 'BDeg5yHDSB', 'xk6g0rCoIZ', 'Vkvg6IaI0J', 'NxCguM9MDP', 'TTAgbTf2HN', 'DYvg9kXsWp', 'pslgx27miv', 'CPggWhqAs8', 'HHigdpqagB' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, HsrGlV44lLvBViRtCU.cs |
High entropy of concatenated method names: 'eEmE56mcv1', 'nCcE0PNAC9', 'mQEE642m7M', 'aPREuwNgC0', 'N13EbNgWF6', 'AlVE99oDp3', 'OVHExraLc9', 'J2CEWo5ut6', 'tPXEd9opBA', 'rvWEj9Bq0v' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, hxdbkFBDOG3GYXCC6J.cs |
High entropy of concatenated method names: 'ToString', 'DaONmYJpON', 'MDANQnT1CQ', 'TkmNOPPjen', 'MBFN3pLBEP', 'PIQN1Mdar1', 'H8yNGy95LZ', 'My5NU5Dp2c', 'jgrNV8sswV', 'VVZNF6iToB' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, ojhQbu8XUN2SA1YWIn.cs |
High entropy of concatenated method names: 'ptiXdpFyiC', 's37XjtV83R', 'ToString', 'UIaX5RQAAE', 'Y07X0EIxO1', 'OWYX6yiegV', 'zywXuiKGYY', 'qPqXb31ZK6', 'y5TX9ajlLV', 'uQVXx9Js1b' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, W031NeDnxJaKh7kq0m.cs |
High entropy of concatenated method names: 'm0P6KnjpwJ', 'C1R6tybQc5', 'LRj6ruwArP', 't4E6DnRvqG', 'dxy6y3GhN4', 'Ped6NEv4mA', 'yGy6XRLMF3', 'fuO6ER3fS5', 'c9n6TktAQC', 'S166pZnbNT' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, W92IZu2gnM5iBLPmiS8.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Q0Bphobp2C', 'PrgpS09pe0', 'IJLpBdNisU', 'CWLp8k7pEs', 'JSCp7bI3Sh', 'fhmpfmo0TT', 'K1vpijpUCc' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, Y9DXAaJuhWSHPRE4Ex.cs |
High entropy of concatenated method names: 'w7YnMSgLC', 'D77Kk0FlJ', 'b96tmiT1r', 'H9msNbxGx', 'oiuDitd3m', 'v7vPg1b0Q', 'CqDeN6rErw82KPCB7j', 'YoK4FpWP4uIsWkNfxA', 'Lncefsw3BuGyDbf5bV', 'UbpEm1p7Q' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, EUgWJP05fVsWnH2ls3.cs |
High entropy of concatenated method names: 'Dispose', 'KXH2v1bafu', 'R6UJQQxDqV', 'yygxxteD6Y', 'JQs2HrGlV4', 'tLv2zBViRt', 'ProcessDialogKey', 'dUDJYLRVVH', 'iDsJ2kkQkH', 'KidJJZB9Mf' |
Source: 0.2.PzPxqbK89H.exe.7bb0000.7.raw.unpack, fhbI0kfI6Vya1Km65c.cs |
High entropy of concatenated method names: 'KK9X4GeJ2k', 'K3wXHpC4LI', 'ADgEYnsshE', 'wAXE2hFIS8', 'ReVXm8baBj', 'vxXXabE2Jb', 'gUkXI7HqcD', 'hwoXh0uHl2', 'k9cXSYS54C', 'VSFXBrx37r' |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Users\user\Desktop\PzPxqbK89H.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Users\user\Desktop\PzPxqbK89H.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PzPxqbK89H.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation |
|