Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003179000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C89000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://51.38.247.67:8081/_send_.php?L |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4140515962.0000000000435000.00000040.00000400.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003071000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4140515527.0000000000434000.00000040.00000400.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002B81000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003071000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4140515527.0000000000434000.00000040.00000400.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002B81000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003071000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002B81000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003071000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002B81000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/ |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4140515962.0000000000435000.00000040.00000400.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/q |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003205000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003179000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D14000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://mail.precioustouchfoundation.org |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003205000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003179000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C89000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D14000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://precioustouchfoundation.org |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1722967795.0000000002D44000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003071000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1768336189.0000000003154000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002B81000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003071000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4140515527.0000000000434000.00000040.00000400.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002B81000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://varders.kozow.com:8081 |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.carterandcone.coml |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers? |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designersG |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fonts.com |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.goodfont.co.kr |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sajatypeworks.com |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000000.00000002.1728892252.0000000005474000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.sakkal.com |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sandoll.co.kr |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.tiro.com |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.typography.netD |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.urwpp.deDPlease |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1728997791.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.zhongyicts.com.cn |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003157000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C66000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003157000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C66000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4140515527.0000000000436000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org/bot |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003157000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C66000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003157000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C66000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:445817%0D%0ADate%20a |
Source: lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D42000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D33000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D73000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C89000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.000000000322E000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D3D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003130000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003157000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C40000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C66000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org |
Source: 2i3Lj7a8Gk.exe, 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4140515962.0000000000435000.00000040.00000400.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33 |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.00000000030EB000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003130000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003157000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C40000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C66000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$ |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.000000000419D000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004341000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003179000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004150000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000041C5000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004417000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000042F4000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003F27000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003E52000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003E04000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003CD5000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003CAD000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003C60000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C89000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000041A0000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.000000000412B000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000042CF000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000042FA000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004156000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000043F2000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003E0A000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003C66000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003CB0000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003C3B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.000000000419D000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004341000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.0000000003179000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004150000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000041C5000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004417000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000042F4000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003F27000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003E52000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003E04000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003CD5000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003CAD000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003C60000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C89000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000041A0000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.000000000412B000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000042CF000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000042FA000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.0000000004156000.00000004.00000800.00020000.00000000.sdmp, 2i3Lj7a8Gk.exe, 00000006.00000002.4149503231.00000000043F2000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003E0A000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003C66000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003CB0000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4149676725.0000000003C3B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D73000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002C89000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.office.com/ |
Source: 2i3Lj7a8Gk.exe, 00000006.00000002.4142790643.000000000325F000.00000004.00000800.00020000.00000000.sdmp, lyNyKapwZJLKnn.exe, 0000000D.00000002.4143062604.0000000002D6E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.office.com/lB |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_0110E12C |
0_2_0110E12C |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD0A28 |
0_2_06FD0A28 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD17A8 |
0_2_06FD17A8 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD1798 |
0_2_06FD1798 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD8538 |
0_2_06FD8538 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD0270 |
0_2_06FD0270 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD1270 |
0_2_06FD1270 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD0261 |
0_2_06FD0261 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD1260 |
0_2_06FD1260 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD031B |
0_2_06FD031B |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD80BE |
0_2_06FD80BE |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FDA1C0 |
0_2_06FDA1C0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FDAA98 |
0_2_06FDAA98 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD0A18 |
0_2_06FD0A18 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD8970 |
0_2_06FD8970 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 0_2_06FD8960 |
0_2_06FD8960 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0D278 |
6_2_02F0D278 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F05362 |
6_2_02F05362 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0C148 |
6_2_02F0C148 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F07118 |
6_2_02F07118 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0C738 |
6_2_02F0C738 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0C468 |
6_2_02F0C468 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0CA08 |
6_2_02F0CA08 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F069B0 |
6_2_02F069B0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0E988 |
6_2_02F0E988 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F03E18 |
6_2_02F03E18 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0CFA9 |
6_2_02F0CFA9 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0CCD8 |
6_2_02F0CCD8 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F09DE0 |
6_2_02F09DE0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F03A99 |
6_2_02F03A99 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F029E0 |
6_2_02F029E0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0F970 |
6_2_02F0F970 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0E97A |
6_2_02F0E97A |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_02F0F961 |
6_2_02F0F961 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF1E80 |
6_2_06CF1E80 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF17A0 |
6_2_06CF17A0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFFC68 |
6_2_06CFFC68 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF9C18 |
6_2_06CF9C18 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF9548 |
6_2_06CF9548 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF0B30 |
6_2_06CF0B30 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF5028 |
6_2_06CF5028 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF2968 |
6_2_06CF2968 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFE6AF |
6_2_06CFE6AF |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFE6B0 |
6_2_06CFE6B0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF1E70 |
6_2_06CF1E70 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFDE00 |
6_2_06CFDE00 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF178F |
6_2_06CF178F |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFEF51 |
6_2_06CFEF51 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFEF60 |
6_2_06CFEF60 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFCCA0 |
6_2_06CFCCA0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFDDFF |
6_2_06CFDDFF |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFD540 |
6_2_06CFD540 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFD550 |
6_2_06CFD550 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFEAF8 |
6_2_06CFEAF8 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFE249 |
6_2_06CFE249 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFE258 |
6_2_06CFE258 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF8BA0 |
6_2_06CF8BA0 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFF3B8 |
6_2_06CFF3B8 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFEB08 |
6_2_06CFEB08 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF0B20 |
6_2_06CF0B20 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFD0F8 |
6_2_06CFD0F8 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF0040 |
6_2_06CF0040 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFF801 |
6_2_06CFF801 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF501E |
6_2_06CF501E |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFF810 |
6_2_06CFF810 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CF0023 |
6_2_06CF0023 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFD999 |
6_2_06CFD999 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Code function: 6_2_06CFD9A8 |
6_2_06CFD9A8 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 7_2_0173E12C |
7_2_0173E12C |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114C146 |
13_2_0114C146 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_01145362 |
13_2_01145362 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114D278 |
13_2_0114D278 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114C468 |
13_2_0114C468 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114C738 |
13_2_0114C738 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114E988 |
13_2_0114E988 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_011469A0 |
13_2_011469A0 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114CA08 |
13_2_0114CA08 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_01149DE0 |
13_2_01149DE0 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114CCD8 |
13_2_0114CCD8 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114CFAC |
13_2_0114CFAC |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_01146FC8 |
13_2_01146FC8 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_01143E09 |
13_2_01143E09 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114E97C |
13_2_0114E97C |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_0114F961 |
13_2_0114F961 |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_011429EC |
13_2_011429EC |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Code function: 13_2_01143AB1 |
13_2_01143AB1 |
Source: 13.2.lyNyKapwZJLKnn.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 7.2.lyNyKapwZJLKnn.exe.4b973e0.3.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 7.2.lyNyKapwZJLKnn.exe.4b973e0.3.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 7.2.lyNyKapwZJLKnn.exe.4b973e0.3.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.2i3Lj7a8Gk.exe.4662820.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 7.2.lyNyKapwZJLKnn.exe.4b973e0.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 7.2.lyNyKapwZJLKnn.exe.4b973e0.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.2i3Lj7a8Gk.exe.4662820.0.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 7.2.lyNyKapwZJLKnn.exe.4b973e0.3.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.2i3Lj7a8Gk.exe.4662820.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.2i3Lj7a8Gk.exe.4662820.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.2i3Lj7a8Gk.exe.4662820.0.raw.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.2i3Lj7a8Gk.exe.4662820.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000007.00000002.1769534366.0000000004B97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000007.00000002.1769534366.00000000049FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1723487910.000000000432A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: 2i3Lj7a8Gk.exe PID: 6360, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: lyNyKapwZJLKnn.exe PID: 7260, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: microsoft.management.infrastructure.native.unmanaged.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wmidcom.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: taskschd.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: fastprox.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: ncobjapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mpclient.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wmitomi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: taskschd.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: mscoree.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: vcruntime140_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: rasapi32.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: rasman.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: rtutils.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: dhcpcsvc6.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: dhcpcsvc.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: secur32.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Section loaded: dpapi.dll |
|
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, KexrhkrD0V06LqILWv.cs |
High entropy of concatenated method names: 'PB3uQrUN5s', 'ESAuxQmfyf', 'Ft8udpPwvN', 'SwEuAxm5VX', 'YjpugFHsL3', 'dOduMOR807', 'AYfu2w9ufE', 'rnUuZJiMbH', 'KDquXxwMxg', 'djvuoYLc4G' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, aSN3GuMwIV9gTOVQcT.cs |
High entropy of concatenated method names: 'XJGqRZ5gUq9XBaX2Ah6', 'aKdxeO5GsmH2f3jQtWL', 'HsSjF8aPw4', 'IG6jmVBUWc', 'w6ejUhrsjC', 'Oilbp05npgaCGmmIexk', 'oegjw85h56OM7JDTVJ2' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, U2rA3WVWalOxnTMMV4.cs |
High entropy of concatenated method names: 'NOdPZFMp9G', 'XoTPoXLhhf', 'N0nFwaNs98', 'QtsFsR70x2', 'sPsPcy0igF', 'tEqPiwS57V', 'NF3P11vIJX', 'u82PQtf3aQ', 'CbaPxWYubw', 'chnPdWUTXZ' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, IKMnJMAGMWjJkB2Xug.cs |
High entropy of concatenated method names: 'Dispose', 'zJwsX1Kj9N', 'jirhtt9TSQ', 'QJAqq28gy2', 'zeXsoGfp2e', 'Q3Psz19jtL', 'ProcessDialogKey', 'fuChwZhUJ9', 'jGchsIPPDd', 'i9fhhnYZI4' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, eo4T2X1Dv3TgKlbxU1.cs |
High entropy of concatenated method names: 'kbTWyTDRh7', 'hA1WfXdegi', 'YbhWIDDBSt', 'hJUWtmmsHU', 'x2bW7LPwGa', 'uQDWBqG8PQ', 'qCCWH8r18v', 'ggQWYOXkIG', 'uHcWJJYGUp', 'KKUWcCsuuL' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, Lonn3j0q0AQi6YTE3j.cs |
High entropy of concatenated method names: 'fxkFIrHfoO', 'YTSFt0yp7a', 'ksEFlxFYNG', 'OErF7hKg0c', 'YtYFQCqUqA', 'vATFBpiYj7', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, FIkKZKJloOjyigcxKH.cs |
High entropy of concatenated method names: 'UpWFn3gS7S', 'FgoFu2YhNL', 'vFQFEClmFU', 'nEwFbm2T54', 'iYWFjR5AQG', 'ousFCNDJNJ', 'qPeF47R2Vy', 'KFHF6RC82H', 'a4EFS8OitU', 'VWPF3joA2F' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, Qq1obo5AW8WT5RBnbv.cs |
High entropy of concatenated method names: 'Efgb07TkVK', 'V9kbkfB1Kg', 'AJIElkfQ8m', 'OV7E7pcI3O', 'B90EBhrHsZ', 'iOgEewLNV5', 'WloEHpbhak', 'y8kEYBTAWd', 'vGSEK1CaZo', 'jvVEJ8MfRi' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, CgsZrxZ5bJs1isOAsW.cs |
High entropy of concatenated method names: 'UWPmsd4QMr', 'RnQmLNauKL', 'egDmVPQ6eQ', 'k39mnkhrH2', 'gVtmuYhBbi', 'iEgmb6FgUY', 'AiJmjZAgm1', 'NyTF2H4ckQ', 'LHBFZmcP6p', 'pyGFXSUxER' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, SE8ir6ghUdmEJkMdDS.cs |
High entropy of concatenated method names: 'i5ZPSuAxEP', 'nTXP3twPni', 'ToString', 'y1HPneMVfI', 'NgaPuxSA5x', 'F6tPEVQ2SG', 'VsiPbtmcnM', 'trpPjWf00U', 'uDyPC8g9N1', 'BraP4sNq6u' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, DuMROSxCmqfhBtrcL3.cs |
High entropy of concatenated method names: 'yOMLTchpe7', 'WUGLnYiYoA', 'W37LusktDV', 'nAOLERtdAB', 'NOtLbPD8V1', 'a68LjAsYRL', 'HKfLCryrmp', 'Dg9L4lSPIH', 'VSTL65Hk8b', 'GgLLSF9iuC' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, I8KkSGhDf7BGedS1Qv.cs |
High entropy of concatenated method names: 'YOQEaScGNA', 'FHjEGyIy69', 'P3TEyGNNwa', 'zS9EfFPqPh', 'CmbERlnq2v', 'rmNEO8dEDR', 'jowEPurN3f', 'xP0EFmoVC3', 'tAaEm6q92H', 'qXLEURISO7' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, ecKDheHH0uffYM2Fi6g.cs |
High entropy of concatenated method names: 'ToString', 'nCiULlRQEW', 'JtsUVdJmyo', 'D2uUTduAQw', 'SRsUn6kvnT', 'suQUujrSfL', 'z92UE7bTxV', 'jcVUbTGwvP', 'pXB0n1aLvsIBy5wpKXx', 'TC8ga4aKbPMkl7m2aI3' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, IsdtIxHB8KRIqEfRXKj.cs |
High entropy of concatenated method names: 'GiHmrYCSxd', 'viVm8cae9y', 'RV2mN8JTnp', 'YBsmaiJgMm', 'ggem0RM16h', 'uFYmGoni9b', 'jDkmkfAx1u', 'U4Imy04y5y', 'cZ5mf9jI5t', 'yCqmvVeuBy' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, o1qUIqLK21d9xCwImS.cs |
High entropy of concatenated method names: 'vl0jTDoOen', 'dutjuEMCfE', 'dlhjbDukj9', 'SXIjCJwB5h', 'BsSj4xTS9B', 'NEubgfo2Pk', 'XidbMFGR36', 'xvOb2QTN7f', 'svHbZSKI9O', 'ExmbXCWkky' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, gByks8SDMER85a92MA.cs |
High entropy of concatenated method names: 'OwINxex6d', 'Ptdayw1cN', 'j8LG28fbQ', 'upDkMtIpU', 'EYLfUR9Z8', 'zamv3OM1G', 'XPe8lZAqgTFKdHXY4B', 'G5GgMxRJHM3G6iymMR', 'MWV11vH7X2200V9Y0E', 'jTqF4E6fA' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, h50wgh6LF9bYD0ikjA.cs |
High entropy of concatenated method names: 'mwKCrhHvp4', 'Kq4C8T0owC', 'uCuCN2B2OJ', 'O7mCajJEXh', 'j6RC0eZXFJ', 'CAbCG6kwHs', 'k9WCk11vQJ', 'uGjCy69U4i', 'F96CfP8rPK', 'LHvCvogTlg' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, PKeJNeHl4Ackfff2Coj.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'glgUQ9BWxx', 'dyJUxsikDy', 'kH8UdJdeTV', 'jZaUAJPspT', 'HdWUgysWDt', 'c1nUMAMH27', 'sPGU2IjCOY' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, wOtoBA4wweaIJmt93j.cs |
High entropy of concatenated method names: 'RsmCn1tQkg', 'yeNCEyCYfj', 'wW9CjSjB6g', 'LVwjoyeZVZ', 'oA6jzs0shx', 'W0XCwj5YUT', 'DIcCsriERW', 'aANChQbx9O', 'ItQCLZxknk', 'mA2CV915AA' |
Source: 0.2.2i3Lj7a8Gk.exe.45573e0.3.raw.unpack, D3p30FN1f5pTIN89YF.cs |
High entropy of concatenated method names: 'mEYsCWCQH2', 'ehbs4CeB8K', 'XBBsSdcBqB', 'fK0s3N03jZ', 'HQnsRGdDRG', 'S9XsO4qc0a', 'udnwfs0wC0KHgRaGVG', 'VTiteiFRcgynPZ21Dn', 'GhDssHi5ka', 'rhJsLi99uL' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, KexrhkrD0V06LqILWv.cs |
High entropy of concatenated method names: 'PB3uQrUN5s', 'ESAuxQmfyf', 'Ft8udpPwvN', 'SwEuAxm5VX', 'YjpugFHsL3', 'dOduMOR807', 'AYfu2w9ufE', 'rnUuZJiMbH', 'KDquXxwMxg', 'djvuoYLc4G' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, aSN3GuMwIV9gTOVQcT.cs |
High entropy of concatenated method names: 'XJGqRZ5gUq9XBaX2Ah6', 'aKdxeO5GsmH2f3jQtWL', 'HsSjF8aPw4', 'IG6jmVBUWc', 'w6ejUhrsjC', 'Oilbp05npgaCGmmIexk', 'oegjw85h56OM7JDTVJ2' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, U2rA3WVWalOxnTMMV4.cs |
High entropy of concatenated method names: 'NOdPZFMp9G', 'XoTPoXLhhf', 'N0nFwaNs98', 'QtsFsR70x2', 'sPsPcy0igF', 'tEqPiwS57V', 'NF3P11vIJX', 'u82PQtf3aQ', 'CbaPxWYubw', 'chnPdWUTXZ' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, IKMnJMAGMWjJkB2Xug.cs |
High entropy of concatenated method names: 'Dispose', 'zJwsX1Kj9N', 'jirhtt9TSQ', 'QJAqq28gy2', 'zeXsoGfp2e', 'Q3Psz19jtL', 'ProcessDialogKey', 'fuChwZhUJ9', 'jGchsIPPDd', 'i9fhhnYZI4' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, eo4T2X1Dv3TgKlbxU1.cs |
High entropy of concatenated method names: 'kbTWyTDRh7', 'hA1WfXdegi', 'YbhWIDDBSt', 'hJUWtmmsHU', 'x2bW7LPwGa', 'uQDWBqG8PQ', 'qCCWH8r18v', 'ggQWYOXkIG', 'uHcWJJYGUp', 'KKUWcCsuuL' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, Lonn3j0q0AQi6YTE3j.cs |
High entropy of concatenated method names: 'fxkFIrHfoO', 'YTSFt0yp7a', 'ksEFlxFYNG', 'OErF7hKg0c', 'YtYFQCqUqA', 'vATFBpiYj7', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, FIkKZKJloOjyigcxKH.cs |
High entropy of concatenated method names: 'UpWFn3gS7S', 'FgoFu2YhNL', 'vFQFEClmFU', 'nEwFbm2T54', 'iYWFjR5AQG', 'ousFCNDJNJ', 'qPeF47R2Vy', 'KFHF6RC82H', 'a4EFS8OitU', 'VWPF3joA2F' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, Qq1obo5AW8WT5RBnbv.cs |
High entropy of concatenated method names: 'Efgb07TkVK', 'V9kbkfB1Kg', 'AJIElkfQ8m', 'OV7E7pcI3O', 'B90EBhrHsZ', 'iOgEewLNV5', 'WloEHpbhak', 'y8kEYBTAWd', 'vGSEK1CaZo', 'jvVEJ8MfRi' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, CgsZrxZ5bJs1isOAsW.cs |
High entropy of concatenated method names: 'UWPmsd4QMr', 'RnQmLNauKL', 'egDmVPQ6eQ', 'k39mnkhrH2', 'gVtmuYhBbi', 'iEgmb6FgUY', 'AiJmjZAgm1', 'NyTF2H4ckQ', 'LHBFZmcP6p', 'pyGFXSUxER' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, SE8ir6ghUdmEJkMdDS.cs |
High entropy of concatenated method names: 'i5ZPSuAxEP', 'nTXP3twPni', 'ToString', 'y1HPneMVfI', 'NgaPuxSA5x', 'F6tPEVQ2SG', 'VsiPbtmcnM', 'trpPjWf00U', 'uDyPC8g9N1', 'BraP4sNq6u' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, DuMROSxCmqfhBtrcL3.cs |
High entropy of concatenated method names: 'yOMLTchpe7', 'WUGLnYiYoA', 'W37LusktDV', 'nAOLERtdAB', 'NOtLbPD8V1', 'a68LjAsYRL', 'HKfLCryrmp', 'Dg9L4lSPIH', 'VSTL65Hk8b', 'GgLLSF9iuC' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, I8KkSGhDf7BGedS1Qv.cs |
High entropy of concatenated method names: 'YOQEaScGNA', 'FHjEGyIy69', 'P3TEyGNNwa', 'zS9EfFPqPh', 'CmbERlnq2v', 'rmNEO8dEDR', 'jowEPurN3f', 'xP0EFmoVC3', 'tAaEm6q92H', 'qXLEURISO7' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, ecKDheHH0uffYM2Fi6g.cs |
High entropy of concatenated method names: 'ToString', 'nCiULlRQEW', 'JtsUVdJmyo', 'D2uUTduAQw', 'SRsUn6kvnT', 'suQUujrSfL', 'z92UE7bTxV', 'jcVUbTGwvP', 'pXB0n1aLvsIBy5wpKXx', 'TC8ga4aKbPMkl7m2aI3' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, IsdtIxHB8KRIqEfRXKj.cs |
High entropy of concatenated method names: 'GiHmrYCSxd', 'viVm8cae9y', 'RV2mN8JTnp', 'YBsmaiJgMm', 'ggem0RM16h', 'uFYmGoni9b', 'jDkmkfAx1u', 'U4Imy04y5y', 'cZ5mf9jI5t', 'yCqmvVeuBy' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, o1qUIqLK21d9xCwImS.cs |
High entropy of concatenated method names: 'vl0jTDoOen', 'dutjuEMCfE', 'dlhjbDukj9', 'SXIjCJwB5h', 'BsSj4xTS9B', 'NEubgfo2Pk', 'XidbMFGR36', 'xvOb2QTN7f', 'svHbZSKI9O', 'ExmbXCWkky' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, gByks8SDMER85a92MA.cs |
High entropy of concatenated method names: 'OwINxex6d', 'Ptdayw1cN', 'j8LG28fbQ', 'upDkMtIpU', 'EYLfUR9Z8', 'zamv3OM1G', 'XPe8lZAqgTFKdHXY4B', 'G5GgMxRJHM3G6iymMR', 'MWV11vH7X2200V9Y0E', 'jTqF4E6fA' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, h50wgh6LF9bYD0ikjA.cs |
High entropy of concatenated method names: 'mwKCrhHvp4', 'Kq4C8T0owC', 'uCuCN2B2OJ', 'O7mCajJEXh', 'j6RC0eZXFJ', 'CAbCG6kwHs', 'k9WCk11vQJ', 'uGjCy69U4i', 'F96CfP8rPK', 'LHvCvogTlg' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, PKeJNeHl4Ackfff2Coj.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'glgUQ9BWxx', 'dyJUxsikDy', 'kH8UdJdeTV', 'jZaUAJPspT', 'HdWUgysWDt', 'c1nUMAMH27', 'sPGU2IjCOY' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, wOtoBA4wweaIJmt93j.cs |
High entropy of concatenated method names: 'RsmCn1tQkg', 'yeNCEyCYfj', 'wW9CjSjB6g', 'LVwjoyeZVZ', 'oA6jzs0shx', 'W0XCwj5YUT', 'DIcCsriERW', 'aANChQbx9O', 'ItQCLZxknk', 'mA2CV915AA' |
Source: 0.2.2i3Lj7a8Gk.exe.7360000.5.raw.unpack, D3p30FN1f5pTIN89YF.cs |
High entropy of concatenated method names: 'mEYsCWCQH2', 'ehbs4CeB8K', 'XBBsSdcBqB', 'fK0s3N03jZ', 'HQnsRGdDRG', 'S9XsO4qc0a', 'udnwfs0wC0KHgRaGVG', 'VTiteiFRcgynPZ21Dn', 'GhDssHi5ka', 'rhJsLi99uL' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, KexrhkrD0V06LqILWv.cs |
High entropy of concatenated method names: 'PB3uQrUN5s', 'ESAuxQmfyf', 'Ft8udpPwvN', 'SwEuAxm5VX', 'YjpugFHsL3', 'dOduMOR807', 'AYfu2w9ufE', 'rnUuZJiMbH', 'KDquXxwMxg', 'djvuoYLc4G' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, aSN3GuMwIV9gTOVQcT.cs |
High entropy of concatenated method names: 'XJGqRZ5gUq9XBaX2Ah6', 'aKdxeO5GsmH2f3jQtWL', 'HsSjF8aPw4', 'IG6jmVBUWc', 'w6ejUhrsjC', 'Oilbp05npgaCGmmIexk', 'oegjw85h56OM7JDTVJ2' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, U2rA3WVWalOxnTMMV4.cs |
High entropy of concatenated method names: 'NOdPZFMp9G', 'XoTPoXLhhf', 'N0nFwaNs98', 'QtsFsR70x2', 'sPsPcy0igF', 'tEqPiwS57V', 'NF3P11vIJX', 'u82PQtf3aQ', 'CbaPxWYubw', 'chnPdWUTXZ' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, IKMnJMAGMWjJkB2Xug.cs |
High entropy of concatenated method names: 'Dispose', 'zJwsX1Kj9N', 'jirhtt9TSQ', 'QJAqq28gy2', 'zeXsoGfp2e', 'Q3Psz19jtL', 'ProcessDialogKey', 'fuChwZhUJ9', 'jGchsIPPDd', 'i9fhhnYZI4' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, eo4T2X1Dv3TgKlbxU1.cs |
High entropy of concatenated method names: 'kbTWyTDRh7', 'hA1WfXdegi', 'YbhWIDDBSt', 'hJUWtmmsHU', 'x2bW7LPwGa', 'uQDWBqG8PQ', 'qCCWH8r18v', 'ggQWYOXkIG', 'uHcWJJYGUp', 'KKUWcCsuuL' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, Lonn3j0q0AQi6YTE3j.cs |
High entropy of concatenated method names: 'fxkFIrHfoO', 'YTSFt0yp7a', 'ksEFlxFYNG', 'OErF7hKg0c', 'YtYFQCqUqA', 'vATFBpiYj7', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, FIkKZKJloOjyigcxKH.cs |
High entropy of concatenated method names: 'UpWFn3gS7S', 'FgoFu2YhNL', 'vFQFEClmFU', 'nEwFbm2T54', 'iYWFjR5AQG', 'ousFCNDJNJ', 'qPeF47R2Vy', 'KFHF6RC82H', 'a4EFS8OitU', 'VWPF3joA2F' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, Qq1obo5AW8WT5RBnbv.cs |
High entropy of concatenated method names: 'Efgb07TkVK', 'V9kbkfB1Kg', 'AJIElkfQ8m', 'OV7E7pcI3O', 'B90EBhrHsZ', 'iOgEewLNV5', 'WloEHpbhak', 'y8kEYBTAWd', 'vGSEK1CaZo', 'jvVEJ8MfRi' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, CgsZrxZ5bJs1isOAsW.cs |
High entropy of concatenated method names: 'UWPmsd4QMr', 'RnQmLNauKL', 'egDmVPQ6eQ', 'k39mnkhrH2', 'gVtmuYhBbi', 'iEgmb6FgUY', 'AiJmjZAgm1', 'NyTF2H4ckQ', 'LHBFZmcP6p', 'pyGFXSUxER' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, SE8ir6ghUdmEJkMdDS.cs |
High entropy of concatenated method names: 'i5ZPSuAxEP', 'nTXP3twPni', 'ToString', 'y1HPneMVfI', 'NgaPuxSA5x', 'F6tPEVQ2SG', 'VsiPbtmcnM', 'trpPjWf00U', 'uDyPC8g9N1', 'BraP4sNq6u' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, DuMROSxCmqfhBtrcL3.cs |
High entropy of concatenated method names: 'yOMLTchpe7', 'WUGLnYiYoA', 'W37LusktDV', 'nAOLERtdAB', 'NOtLbPD8V1', 'a68LjAsYRL', 'HKfLCryrmp', 'Dg9L4lSPIH', 'VSTL65Hk8b', 'GgLLSF9iuC' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, I8KkSGhDf7BGedS1Qv.cs |
High entropy of concatenated method names: 'YOQEaScGNA', 'FHjEGyIy69', 'P3TEyGNNwa', 'zS9EfFPqPh', 'CmbERlnq2v', 'rmNEO8dEDR', 'jowEPurN3f', 'xP0EFmoVC3', 'tAaEm6q92H', 'qXLEURISO7' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, ecKDheHH0uffYM2Fi6g.cs |
High entropy of concatenated method names: 'ToString', 'nCiULlRQEW', 'JtsUVdJmyo', 'D2uUTduAQw', 'SRsUn6kvnT', 'suQUujrSfL', 'z92UE7bTxV', 'jcVUbTGwvP', 'pXB0n1aLvsIBy5wpKXx', 'TC8ga4aKbPMkl7m2aI3' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, IsdtIxHB8KRIqEfRXKj.cs |
High entropy of concatenated method names: 'GiHmrYCSxd', 'viVm8cae9y', 'RV2mN8JTnp', 'YBsmaiJgMm', 'ggem0RM16h', 'uFYmGoni9b', 'jDkmkfAx1u', 'U4Imy04y5y', 'cZ5mf9jI5t', 'yCqmvVeuBy' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, o1qUIqLK21d9xCwImS.cs |
High entropy of concatenated method names: 'vl0jTDoOen', 'dutjuEMCfE', 'dlhjbDukj9', 'SXIjCJwB5h', 'BsSj4xTS9B', 'NEubgfo2Pk', 'XidbMFGR36', 'xvOb2QTN7f', 'svHbZSKI9O', 'ExmbXCWkky' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, gByks8SDMER85a92MA.cs |
High entropy of concatenated method names: 'OwINxex6d', 'Ptdayw1cN', 'j8LG28fbQ', 'upDkMtIpU', 'EYLfUR9Z8', 'zamv3OM1G', 'XPe8lZAqgTFKdHXY4B', 'G5GgMxRJHM3G6iymMR', 'MWV11vH7X2200V9Y0E', 'jTqF4E6fA' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, h50wgh6LF9bYD0ikjA.cs |
High entropy of concatenated method names: 'mwKCrhHvp4', 'Kq4C8T0owC', 'uCuCN2B2OJ', 'O7mCajJEXh', 'j6RC0eZXFJ', 'CAbCG6kwHs', 'k9WCk11vQJ', 'uGjCy69U4i', 'F96CfP8rPK', 'LHvCvogTlg' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, PKeJNeHl4Ackfff2Coj.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'glgUQ9BWxx', 'dyJUxsikDy', 'kH8UdJdeTV', 'jZaUAJPspT', 'HdWUgysWDt', 'c1nUMAMH27', 'sPGU2IjCOY' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, wOtoBA4wweaIJmt93j.cs |
High entropy of concatenated method names: 'RsmCn1tQkg', 'yeNCEyCYfj', 'wW9CjSjB6g', 'LVwjoyeZVZ', 'oA6jzs0shx', 'W0XCwj5YUT', 'DIcCsriERW', 'aANChQbx9O', 'ItQCLZxknk', 'mA2CV915AA' |
Source: 0.2.2i3Lj7a8Gk.exe.45dce00.2.raw.unpack, D3p30FN1f5pTIN89YF.cs |
High entropy of concatenated method names: 'mEYsCWCQH2', 'ehbs4CeB8K', 'XBBsSdcBqB', 'fK0s3N03jZ', 'HQnsRGdDRG', 'S9XsO4qc0a', 'udnwfs0wC0KHgRaGVG', 'VTiteiFRcgynPZ21Dn', 'GhDssHi5ka', 'rhJsLi99uL' |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599437 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599326 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598671 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598323 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598203 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598093 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597981 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597873 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597765 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597656 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597546 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597437 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597328 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597218 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597109 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596890 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596672 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596562 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596453 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596343 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596015 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595902 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595671 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595562 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595453 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595343 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595231 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595109 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594890 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594671 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594562 |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 922337203685477 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 600000 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599885 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599765 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599656 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599547 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599437 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599328 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599218 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599109 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599000 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598890 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598781 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598671 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598562 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598453 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598343 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598234 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598124 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598015 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597906 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597797 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597687 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597578 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597468 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597359 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597250 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597140 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597031 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596921 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596812 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596703 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596581 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596453 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596343 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596229 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596109 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595997 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595852 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595728 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595609 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595500 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595390 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595281 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595169 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595062 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594953 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594843 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594734 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594625 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594515 |
|
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 6304 |
Thread sleep time: -922337203685477s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7268 |
Thread sleep time: -5534023222112862s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep count: 35 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -32281802128991695s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -600000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7424 |
Thread sleep count: 2893 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599875s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599765s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7424 |
Thread sleep count: 6950 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599656s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599547s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599437s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599326s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599218s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -599000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598671s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598323s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598203s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -598093s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597981s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597873s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597765s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597656s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597546s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597437s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597328s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597218s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -597000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596672s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596234s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596125s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -596015s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595902s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595671s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595231s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -595000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -594890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -594781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -594671s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe TID: 7400 |
Thread sleep time: -594562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7288 |
Thread sleep time: -922337203685477s >= -30000s |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep count: 31 > 30 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -28592453314249787s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -600000s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7636 |
Thread sleep count: 1396 > 30 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599885s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7636 |
Thread sleep count: 8462 > 30 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599765s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599656s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599547s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599437s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599328s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599218s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599109s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -599000s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598890s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598781s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598671s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598562s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598453s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598343s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598234s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598124s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -598015s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597906s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597797s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597687s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597578s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597468s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597359s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597250s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597140s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -597031s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596921s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596812s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596703s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596581s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596453s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596343s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596229s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -596109s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595997s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595852s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595728s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595609s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595500s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595390s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595281s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595169s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -595062s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -594953s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -594843s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -594734s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -594625s >= -30000s |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe TID: 7628 |
Thread sleep time: -594515s >= -30000s |
|
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599656 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599437 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599326 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598671 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598323 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598203 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 598093 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597981 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597873 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597765 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597656 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597546 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597437 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597328 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597218 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597109 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 597000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596890 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596672 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596562 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596453 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596343 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 596015 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595902 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595671 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595562 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595453 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595343 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595231 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595109 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 595000 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594890 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594781 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594671 |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Thread delayed: delay time: 594562 |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 922337203685477 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 600000 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599885 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599765 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599656 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599547 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599437 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599328 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599218 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599109 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 599000 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598890 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598781 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598671 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598562 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598453 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598343 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598234 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598124 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 598015 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597906 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597797 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597687 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597578 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597468 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597359 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597250 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597140 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 597031 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596921 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596812 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596703 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596581 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596453 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596343 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596229 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 596109 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595997 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595852 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595728 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595609 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595500 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595390 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595281 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595169 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 595062 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594953 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594843 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594734 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594625 |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Thread delayed: delay time: 594515 |
|
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Users\user\Desktop\2i3Lj7a8Gk.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Users\user\Desktop\2i3Lj7a8Gk.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\2i3Lj7a8Gk.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
|
Source: C:\Users\user\AppData\Roaming\lyNyKapwZJLKnn.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
|