Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://51.38.247.67:8081/_send_.php?L |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crt0 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/ |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/q |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl0H |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl0 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3718826716.00000000013E6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.6.dr |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab; |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?bba7b30f77af5 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabH |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?bba7b30f77 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0Q |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1268385420.00000000032C7000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://varders.kozow.com:8081 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006999000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.0000000006960000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3725754423.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.digicert.com/CPS0 |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.000000000325B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org/bot |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: VbcXXnmIwPPhh.exe, 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.00000000031FD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3724038248.00000000041D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: VbcXXnmIwPPhh.exe, 00000006.00000002.3720383294.0000000003269000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.office.com/ |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 0_2_0308DE4C |
0_2_0308DE4C |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 0_2_0AB106A8 |
0_2_0AB106A8 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 0_2_0AB132C8 |
0_2_0AB132C8 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 0_2_0AB10698 |
0_2_0AB10698 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168C146 |
6_2_0168C146 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_01687118 |
6_2_01687118 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168A088 |
6_2_0168A088 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_01685362 |
6_2_01685362 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168D278 |
6_2_0168D278 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168C468 |
6_2_0168C468 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168C738 |
6_2_0168C738 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_016869A0 |
6_2_016869A0 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168E988 |
6_2_0168E988 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168CA08 |
6_2_0168CA08 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168CCD8 |
6_2_0168CCD8 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168CFAB |
6_2_0168CFAB |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_01683E09 |
6_2_01683E09 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168F631 |
6_2_0168F631 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168E97B |
6_2_0168E97B |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_01683AB1 |
6_2_01683AB1 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_0168FA88 |
6_2_0168FA88 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF1E80 |
6_2_06DF1E80 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF17A0 |
6_2_06DF17A0 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF0B30 |
6_2_06DF0B30 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF9C70 |
6_2_06DF9C70 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF5028 |
6_2_06DF5028 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF9548 |
6_2_06DF9548 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF2968 |
6_2_06DF2968 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFEAF8 |
6_2_06DFEAF8 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFE6B0 |
6_2_06DFE6B0 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFE6AF |
6_2_06DFE6AF |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFE258 |
6_2_06DFE258 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFE249 |
6_2_06DFE249 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF1E77 |
6_2_06DF1E77 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFDE00 |
6_2_06DFDE00 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF1793 |
6_2_06DF1793 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF8B93 |
6_2_06DF8B93 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFF3B8 |
6_2_06DFF3B8 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF8BA0 |
6_2_06DF8BA0 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFEF51 |
6_2_06DFEF51 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFEF60 |
6_2_06DFEF60 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFEB08 |
6_2_06DFEB08 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF0B20 |
6_2_06DF0B20 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFD0F8 |
6_2_06DFD0F8 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFCCA0 |
6_2_06DFCCA0 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF0040 |
6_2_06DF0040 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF9C6D |
6_2_06DF9C6D |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFFC68 |
6_2_06DFFC68 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF501F |
6_2_06DF501F |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFF810 |
6_2_06DFF810 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF0007 |
6_2_06DF0007 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFF801 |
6_2_06DFF801 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFDDFF |
6_2_06DFDDFF |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFD999 |
6_2_06DFD999 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFD9A8 |
6_2_06DFD9A8 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFD550 |
6_2_06DFD550 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DF9543 |
6_2_06DF9543 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Code function: 6_2_06DFD540 |
6_2_06DFD540 |
Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6.2.VbcXXnmIwPPhh.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.VbcXXnmIwPPhh.exe.44a56e0.4.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.VbcXXnmIwPPhh.exe.430a080.6.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000006.00000002.3715386141.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1270613564.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 6212, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: VbcXXnmIwPPhh.exe PID: 4888, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: microsoft.management.infrastructure.native.unmanaged.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wmidcom.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: fastprox.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: ncobjapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mpclient.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wmitomi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: 0.2.VbcXXnmIwPPhh.exe.32fd858.3.raw.unpack, JK.cs |
High entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, v7TfX0cN66hhgJUJwJ.cs |
High entropy of concatenated method names: 'ToString', 'tYtEm3rlXp', 'vZaEZQIpk3', 'enfECqHPKk', 'TiREs4OPj4', 'V4sE1AleDf', 'o8jElDFfEH', 'X9YEXlv4sh', 'WhJE57XeeZ', 'sy4EguL75h' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, Ny32pHRu6f6w0bk14d.cs |
High entropy of concatenated method names: 'EUQxy60RTE', 'GOrxOnVlIn', 'mxyaCSY16D', 'd7gasNaEoC', 'RYVa16poEv', 'ro7alD1Ytv', 'Pj2aX56jE5', 'nvRa5RHSuw', 'zaXagL67RF', 'ijHaM3PHBR' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, SjH6iEglMe4JJag9x8.cs |
High entropy of concatenated method names: 'GTgTv7jFOs', 'g63T6gTtJJ', 'Un5TBFqG9v', 'RACTJMZ9bi', 'uDUTyXXH8o', 'ttpTIMn7My', 'ixwTOcamDV', 'U8FTGJyhTc', 'DRgT0oSJJc', 'vXTTRDyaMP' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, fLnSLcQsburVYyKgWh.cs |
High entropy of concatenated method names: 'pIb9MloKhA', 'btn94NtaLA', 'mTK9QfZnoS', 'wRd9894dcU', 'ET59Z9xoO7', 'xL09CQygcx', 'qP89sdBucM', 'Rwp91lgwXE', 'fPj9ls0GM0', 'nks9XUYwAO' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, rlPD0bXvfvPTrMIcH5.cs |
High entropy of concatenated method names: 'e65TwXhNAU', 'w7ATay3otw', 'vrOTr8r1hQ', 'c6drog7VmU', 'QRvrzRjDHx', 'D5mTdY4DOy', 'XJwTi8ol6A', 'Et7TtSsUv7', 'c1ETWhxGlJ', 'it6T2gL70U' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, LL8myueE5FL4FwPBUS.cs |
High entropy of concatenated method names: 'IGY7wAn8xX', 'SMf7bnNiMM', 'gai7aBcGKZ', 'gYU7xa46mf', 'Tai7ri1XLD', 'RWM7Tud8cw', 'S477LeGX0v', 'oWQ7jDfCfk', 'X567VkWFsL', 'qgK7k0yM4F' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, aTN0PgLVcauSVu2vqN.cs |
High entropy of concatenated method names: 'x2HWAJrm7n', 'YRBWwTlYhH', 'NITWbSnOJ8', 'oykWaLIb5Y', 'QgSWx7XFW1', 'el2WrcOKqI', 'IlEWTQlXkN', 'XqqWLYjyje', 'AZZWjYFYgF', 'eZoWVEVCrl' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, nH6PHboIq1eMy9lsOx.cs |
High entropy of concatenated method names: 'ackui3ikbG', 'gSuuWAk9xU', 'vdRu2MdvAZ', 'SFIuws18kO', 'yPpub68xXI', 'OkEuxOlrHJ', 'zp8urCGwpj', 'kWA7FodH4s', 'kgH7eVO1XV', 'ktZ7DwkVEe' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, kUuY6siW5vyxdHktXRf.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lNPfQMtMH6', 'fkjf8cg9YX', 'CT4fc0NUBi', 'F4vfU3T65j', 'Py4fnEdgPE', 'TU0fSVvsBc', 'PXIfFg2SIF' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, KdrMBNtPmnWruc2Qo7.cs |
High entropy of concatenated method names: 'bNhBtReFj', 'YwuJEL0k0', 'STtIOekSi', 'TA5O2Qx0W', 'Uwx0i4UAw', 'SKZRHMqIX', 'FaWcWiVd8IfEJwL3Zh', 'aP4F1ZkeqAoDHx4Lni', 'hY17K8DD4', 'YC2fqW3vm' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, eRvY0DhwwMDag3tMd8.cs |
High entropy of concatenated method names: 'kEKrAhwBHI', 'QSIrbFKx8p', 'ktdrxpX7HE', 'J8drTrlP1a', 'NQZrLqnoFZ', 'Ddvxn0inuX', 'uhsxSNldTl', 'uZmxFBsHXU', 'yk3xe1MXrB', 'eqtxDwg8Hs' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, L6vjyKid9aDaoe5HiaO.cs |
High entropy of concatenated method names: 'tKYuvg3uhQ', 'dkau6uePqw', 'LNruBiEWeX', 'bvEuJGXBRD', 'JXvuy30LoP', 'i90uII0vV5', 'OpSuOBSVNI', 'VUEuG1wI7u', 'pYqu0SUl47', 'GmmuRirhCu' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, p94yMyHuCERHsEo3os.cs |
High entropy of concatenated method names: 'UsUKGd1mkt', 'U6CK0pf1S0', 'S3PKhLWoSg', 'UerKZ8wgdv', 'aD9KsVHUvx', 'SaAK1fhsGJ', 'vllKXTUJdY', 'AOYK5k7Qcf', 'WbUKM7gBsa', 'uhFKmU0jCt' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, HBDxB2GmiOduxajCiD.cs |
High entropy of concatenated method names: 'VG8bQdamFt', 'Mcsb8Neh6h', 'j76bcyQceC', 'rqobUIVvGH', 'GOmbn1VCfa', 'XEBbSAXcxL', 'cY6bFGmfXk', 'rZ0be0CNYh', 'FPbbDSgUqK', 'NdcbonGkta' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, qHKnAkDX8ytgCp1mSc.cs |
High entropy of concatenated method names: 'XcY7hRUl9B', 'Lf07Z6ZgBh', 'dTS7CjD8xQ', 'I7x7s45AYg', 'XK67QEMgwi', 'M0i719PkGi', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, sjbL9g05wUgikYyDq1.cs |
High entropy of concatenated method names: 'm27aJnf468', 'bAfaI74f6b', 'JqVaGiBOTZ', 'Cfsa0q7xQy', 'eDra9nnYur', 'qUOaENg53T', 'l30aN5OS2T', 'ttJa7hxU2t', 'I0FauJhQu3', 'VNAafHbWpQ' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, XOPcij2EZTlP5u1gAE.cs |
High entropy of concatenated method names: 'oiZiTBDxB2', 'OiOiLduxaj', 'N5wiVUgikY', 'ADqik1gy32', 'gk1i94dARv', 'v0DiEwwMDa', 'h9K238GjxV4a826a1t', 'AXiI3JJh6XSFe6oQp7', 'waYiijekAY', 'AEpiW4fqTH' |
Source: 0.2.VbcXXnmIwPPhh.exe.452ab00.5.raw.unpack, qiNcDkbGW6sJO9UAgD.cs |
High entropy of concatenated method names: 'Dispose', 'p7uiDLa8Py', 'MSFtZuGERn', 'TOyqqR1KP0', 'P5Lio8myuE', 'MFLiz4FwPB', 'ProcessDialogKey', 'TS7tdHKnAk', 'K8ytitgCp1', 'OScttkH6PH' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, v7TfX0cN66hhgJUJwJ.cs |
High entropy of concatenated method names: 'ToString', 'tYtEm3rlXp', 'vZaEZQIpk3', 'enfECqHPKk', 'TiREs4OPj4', 'V4sE1AleDf', 'o8jElDFfEH', 'X9YEXlv4sh', 'WhJE57XeeZ', 'sy4EguL75h' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, Ny32pHRu6f6w0bk14d.cs |
High entropy of concatenated method names: 'EUQxy60RTE', 'GOrxOnVlIn', 'mxyaCSY16D', 'd7gasNaEoC', 'RYVa16poEv', 'ro7alD1Ytv', 'Pj2aX56jE5', 'nvRa5RHSuw', 'zaXagL67RF', 'ijHaM3PHBR' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, SjH6iEglMe4JJag9x8.cs |
High entropy of concatenated method names: 'GTgTv7jFOs', 'g63T6gTtJJ', 'Un5TBFqG9v', 'RACTJMZ9bi', 'uDUTyXXH8o', 'ttpTIMn7My', 'ixwTOcamDV', 'U8FTGJyhTc', 'DRgT0oSJJc', 'vXTTRDyaMP' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, fLnSLcQsburVYyKgWh.cs |
High entropy of concatenated method names: 'pIb9MloKhA', 'btn94NtaLA', 'mTK9QfZnoS', 'wRd9894dcU', 'ET59Z9xoO7', 'xL09CQygcx', 'qP89sdBucM', 'Rwp91lgwXE', 'fPj9ls0GM0', 'nks9XUYwAO' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, rlPD0bXvfvPTrMIcH5.cs |
High entropy of concatenated method names: 'e65TwXhNAU', 'w7ATay3otw', 'vrOTr8r1hQ', 'c6drog7VmU', 'QRvrzRjDHx', 'D5mTdY4DOy', 'XJwTi8ol6A', 'Et7TtSsUv7', 'c1ETWhxGlJ', 'it6T2gL70U' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, LL8myueE5FL4FwPBUS.cs |
High entropy of concatenated method names: 'IGY7wAn8xX', 'SMf7bnNiMM', 'gai7aBcGKZ', 'gYU7xa46mf', 'Tai7ri1XLD', 'RWM7Tud8cw', 'S477LeGX0v', 'oWQ7jDfCfk', 'X567VkWFsL', 'qgK7k0yM4F' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, aTN0PgLVcauSVu2vqN.cs |
High entropy of concatenated method names: 'x2HWAJrm7n', 'YRBWwTlYhH', 'NITWbSnOJ8', 'oykWaLIb5Y', 'QgSWx7XFW1', 'el2WrcOKqI', 'IlEWTQlXkN', 'XqqWLYjyje', 'AZZWjYFYgF', 'eZoWVEVCrl' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, nH6PHboIq1eMy9lsOx.cs |
High entropy of concatenated method names: 'ackui3ikbG', 'gSuuWAk9xU', 'vdRu2MdvAZ', 'SFIuws18kO', 'yPpub68xXI', 'OkEuxOlrHJ', 'zp8urCGwpj', 'kWA7FodH4s', 'kgH7eVO1XV', 'ktZ7DwkVEe' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, kUuY6siW5vyxdHktXRf.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lNPfQMtMH6', 'fkjf8cg9YX', 'CT4fc0NUBi', 'F4vfU3T65j', 'Py4fnEdgPE', 'TU0fSVvsBc', 'PXIfFg2SIF' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, KdrMBNtPmnWruc2Qo7.cs |
High entropy of concatenated method names: 'bNhBtReFj', 'YwuJEL0k0', 'STtIOekSi', 'TA5O2Qx0W', 'Uwx0i4UAw', 'SKZRHMqIX', 'FaWcWiVd8IfEJwL3Zh', 'aP4F1ZkeqAoDHx4Lni', 'hY17K8DD4', 'YC2fqW3vm' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, eRvY0DhwwMDag3tMd8.cs |
High entropy of concatenated method names: 'kEKrAhwBHI', 'QSIrbFKx8p', 'ktdrxpX7HE', 'J8drTrlP1a', 'NQZrLqnoFZ', 'Ddvxn0inuX', 'uhsxSNldTl', 'uZmxFBsHXU', 'yk3xe1MXrB', 'eqtxDwg8Hs' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, L6vjyKid9aDaoe5HiaO.cs |
High entropy of concatenated method names: 'tKYuvg3uhQ', 'dkau6uePqw', 'LNruBiEWeX', 'bvEuJGXBRD', 'JXvuy30LoP', 'i90uII0vV5', 'OpSuOBSVNI', 'VUEuG1wI7u', 'pYqu0SUl47', 'GmmuRirhCu' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, p94yMyHuCERHsEo3os.cs |
High entropy of concatenated method names: 'UsUKGd1mkt', 'U6CK0pf1S0', 'S3PKhLWoSg', 'UerKZ8wgdv', 'aD9KsVHUvx', 'SaAK1fhsGJ', 'vllKXTUJdY', 'AOYK5k7Qcf', 'WbUKM7gBsa', 'uhFKmU0jCt' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, HBDxB2GmiOduxajCiD.cs |
High entropy of concatenated method names: 'VG8bQdamFt', 'Mcsb8Neh6h', 'j76bcyQceC', 'rqobUIVvGH', 'GOmbn1VCfa', 'XEBbSAXcxL', 'cY6bFGmfXk', 'rZ0be0CNYh', 'FPbbDSgUqK', 'NdcbonGkta' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, qHKnAkDX8ytgCp1mSc.cs |
High entropy of concatenated method names: 'XcY7hRUl9B', 'Lf07Z6ZgBh', 'dTS7CjD8xQ', 'I7x7s45AYg', 'XK67QEMgwi', 'M0i719PkGi', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, sjbL9g05wUgikYyDq1.cs |
High entropy of concatenated method names: 'm27aJnf468', 'bAfaI74f6b', 'JqVaGiBOTZ', 'Cfsa0q7xQy', 'eDra9nnYur', 'qUOaENg53T', 'l30aN5OS2T', 'ttJa7hxU2t', 'I0FauJhQu3', 'VNAafHbWpQ' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, XOPcij2EZTlP5u1gAE.cs |
High entropy of concatenated method names: 'oiZiTBDxB2', 'OiOiLduxaj', 'N5wiVUgikY', 'ADqik1gy32', 'gk1i94dARv', 'v0DiEwwMDa', 'h9K238GjxV4a826a1t', 'AXiI3JJh6XSFe6oQp7', 'waYiijekAY', 'AEpiW4fqTH' |
Source: 0.2.VbcXXnmIwPPhh.exe.7730000.8.raw.unpack, qiNcDkbGW6sJO9UAgD.cs |
High entropy of concatenated method names: 'Dispose', 'p7uiDLa8Py', 'MSFtZuGERn', 'TOyqqR1KP0', 'P5Lio8myuE', 'MFLiz4FwPB', 'ProcessDialogKey', 'TS7tdHKnAk', 'K8ytitgCp1', 'OScttkH6PH' |
Source: 0.2.VbcXXnmIwPPhh.exe.32f4240.0.raw.unpack, JK.cs |
High entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq' |
Source: 0.2.VbcXXnmIwPPhh.exe.32a52e4.2.raw.unpack, JK.cs |
High entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq' |
Source: 0.2.VbcXXnmIwPPhh.exe.32ae8fc.1.raw.unpack, JK.cs |
High entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq' |
Source: 0.2.VbcXXnmIwPPhh.exe.5a60000.7.raw.unpack, JK.cs |
High entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq' |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599890 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599780 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599671 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599560 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599437 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598671 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598343 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598234 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598125 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598015 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597906 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597796 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597687 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597577 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597468 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597359 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597250 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597140 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597031 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596921 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596812 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596703 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596590 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596468 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596359 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596015 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595906 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595796 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595672 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595562 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595453 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595343 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595218 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595109 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595000 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594865 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594750 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594640 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594531 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 3500 |
Thread sleep time: -922337203685477s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4512 |
Thread sleep time: -5534023222112862s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -28592453314249787s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -600000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599780s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599671s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599560s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599437s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599328s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599218s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -599000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598671s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598234s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598125s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -598015s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597906s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597796s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597687s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597577s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597468s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597359s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597250s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597140s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -597031s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596921s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596812s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596703s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596590s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596468s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596359s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596234s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596125s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -596015s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595906s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595796s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595672s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595218s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -595000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -594865s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -594750s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -594640s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe TID: 5924 |
Thread sleep time: -594531s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599890 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599780 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599671 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599560 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599437 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598671 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598343 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598234 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598125 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 598015 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597906 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597796 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597687 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597577 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597468 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597359 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597250 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597140 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 597031 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596921 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596812 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596703 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596590 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596468 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596359 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 596015 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595906 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595796 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595672 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595562 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595453 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595343 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595218 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595109 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 595000 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594865 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594750 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594640 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Thread delayed: delay time: 594531 |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\VbcXXnmIwPPhh.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |