Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031E3000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031C8000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000322C000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000321E000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003135000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031C8000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000322C000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000321E000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003135000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000000.00000002.2125630362.00000000039A1000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2333395480.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031E3000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000314D000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031C8000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000322C000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000321E000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031F0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000000.00000002.2125321098.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031E3000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003178000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031C8000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000322C000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000321E000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003135000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000000.00000002.2125630362.00000000039A1000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2333395480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003135000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003135000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188 |
Source: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031E3000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.0000000003178000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031C8000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000322C000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.000000000321E000.00000004.00000800.00020000.00000000.sdmp, #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe, 00000004.00000002.2334935296.00000000031F0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188$ |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000004.00000002.2333395480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000004.00000002.2333395480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000000.00000002.2125630362.00000000039A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000002.2125630362.00000000039A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 1864, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 1864, type: MEMORYSTR | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 5996, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 5996, type: MEMORYSTR | Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 4.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a3dc98.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3a5e0b8.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000004.00000002.2333395480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000004.00000002.2333395480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000000.00000002.2125630362.00000000039A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.2125630362.00000000039A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 1864, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 1864, type: MEMORYSTR | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 5996, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe PID: 5996, type: MEMORYSTR | Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: fastprox.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: ncobjapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mpclient.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wmitomi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\choice.exe | Section loaded: version.dll | Jump to behavior |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.5440000.4.raw.unpack, MainForm.cs | High entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.5440000.4.raw.unpack, at4ONG9F0NYCELN5Tj.cs | High entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, MainForm.cs | High entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.39be790.2.raw.unpack, at4ONG9F0NYCELN5Tj.cs | High entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, KtckAGP4KduPbF19OL.cs | High entropy of concatenated method names: 'z3G8J5hhfq', 'xWH8igJfCg', 'z0O8M5qqCq', 'W1OMSaO6qD', 'jhLMzYbGYb', 'SGV827Cp0J', 'EEW8YdY0n5', 'Dek8NPjqJT', 'nLh8hJIfK6', 'r9J8dnwcd4' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, Qd9oHHF5356ntDR93t.cs | High entropy of concatenated method names: 'aGSZUHsYu0', 'hu6ZSripkJ', 'cExe2INvob', 'NPceY2FaOV', 'Ls0ZFHENcD', 'k4SZamPcn2', 'Ne4ZLpMY4G', 'kETZmWnqH6', 'rF5ZfD47k9', 'W5VZxUDFgN' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, dhjLZ71Qcg7PFDfiPh.cs | High entropy of concatenated method names: 'r0LipLrhvq', 'lCfiyBT9TV', 'V0IiBfrnnV', 'aV6iDiZo1A', 'LOui431L7d', 'pAriWP7lXc', 'o5WiZ9FVCK', 'zmyieWBMLr', 'l5piKyCQ1B', 'Fu2iCXbeLP' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, Vd9pFr3dyrKFhc0FTEf.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ExjCmJyfQx', 'WKWCfpxhwa', 'rJ1CxOe4wB', 'BlQCPlHyTc', 'cXhCI6v7u3', 'BTNCONyjNw', 'g0WCt8Wfxp' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, TEe4hMMB43E5tw1PaQ.cs | High entropy of concatenated method names: 'vX2eJVwk4C', 'zAte16ZSFF', 'vNSeinspWN', 'x5ieVOeFD2', 'U3SeM9LWbE', 'owLe8RFV2F', 'QFyebyoPlJ', 'CFsecwtqU9', 'mwIe3cCUMC', 'OyyeqSelFr' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, Dxgl03ctXyn07SAmmH.cs | High entropy of concatenated method names: 'tuc46qv60U', 'JyK4aACb7k', 'Owr4mgCS42', 'l694f7TWsu', 'ObA4T5XxuB', 'JJe4AV0boA', 'eSy4lKtUtJ', 'Wuf40TpHO6', 'ssL49V7t3U', 'YBG4ng6N78' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, WcK5ZwvvWKvNsa3Aub.cs | High entropy of concatenated method names: 'VOvKYlKc66', 'uMvKhhI5Wm', 'CKMKd5qTCD', 'aCxKJY7tLv', 'D0CK1D8qAO', 'b9UKVL2Hua', 'fHxKMSjf1Q', 'sPhet7IMI0', 'HVheU2c8f3', 'rhXeHTJpte' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, dDQSxhVD9kXbPF8MmU.cs | High entropy of concatenated method names: 'Dispose', 'z9nYHKSe4h', 'woXNTdrQjV', 'QtijjjIlGm', 'VokYShEDS4', 'QGEYzUA4Ex', 'ProcessDialogKey', 'DRsN2ZLCjC', 'UfHNY2ur3P', 'JDlNN2ydcs' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, uyK1WwGMfcWSqQflgQ.cs | High entropy of concatenated method names: 'YwHhowlmZc', 'T5DhJ9aj34', 'CRgh1ycAyJ', 'E5uhiCQHvv', 'pb5hVwmLfT', 'UCrhMWRgYH', 'xeNh8oVDgL', 'LXkhb22X1a', 'Kekhc3mPjy', 'IEKh33dc5x' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, NCxtIEODogvXdXdW3v.cs | High entropy of concatenated method names: 'yJY4tbK7TT', 'rBt4UJLINu', 'LY84Heq8vG', 'O6d4SWhyjK', 'HZMMfX5bGbMIp1uoPLq', 'IlETwO5iSigx6BqWpDk', 'ae9ALq5sCOXtC5rWHw7' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, kBBGMbJqa9vcwLf0Ye.cs | High entropy of concatenated method names: 'V3fwQLbiw', 'p5Op2e48J', 'SIGyPRLKl', 'tPekAcRrC', 'yI9D54O9V', 'zMsvEJx1l', 'NqDbq4d6eIlVGwKRN4', 'XOvu9egnaZBeCnLLeY', 'sNweGUOT0', 'IB4ChvNUU' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, aSVla14Vjle8v5RVC6.cs | High entropy of concatenated method names: 'KSYY8vrnsg', 'pNVYbhRO06', 'NWFY3SmfNh', 'O8nYqcreTS', 'THUY4yy3Jc', 'pgsYWUl1wC', 'Q1EtGJaj9Dhhmc2MIA', 'VP0hdQZtVE45M3jPZO', 'bPsYYgwLAH', 'zOHYhj3qsU' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, yYIsrngYJoLmkm4uHU.cs | High entropy of concatenated method names: 'AjmZ3xQv7O', 'OYvZqiGb2u', 'ToString', 'tSuZJk9ZFV', 'PLTZ1JmxX0', 'ecwZicN2l8', 'JLdZVOqHPs', 'V9bZMITSgt', 'EUTZ8iDdyI', 'GLZZbSLKiK' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, fZjjLS8rBJd637hSUC.cs | High entropy of concatenated method names: 'VN4Mo831Ul', 'iIAM15byxo', 'f8YMVbUDAs', 'TkmM8u7VKW', 'IW4MbO6Cl6', 'fKUVI2Y3rT', 'oX0VOKnBq1', 'wxMVtd0iV0', 'RbqVUQUDBA', 'WTUVHWp3RE' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, EuSdkS3YXPmAULTSjF1.cs | High entropy of concatenated method names: 'eV9Kgh7LKt', 'OnvK7Alt1Q', 'qgrKw1rWEI', 'dFYKp5bLHg', 'XgsKu6pdTF', 'g3hKyrYkrl', 'ixhKkpXXcL', 'vOnKBqpuT5', 'MSyKD6K5AB', 'XSHKvt1arp' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, SwxenDzNWdRYCNKgTj.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HYjKsvqMgb', 'QxEK4bScLU', 'pdKKWcK2X7', 'UHAKZuaX3X', 'EsfKeHLYTM', 'wkyKKX0jm9', 'wsQKCXYEUZ' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, zWGqxwycZ09tq4rIEJ.cs | High entropy of concatenated method names: 'nD1sBmnxWV', 'GVgsDTQgw6', 'vDksGZM4YV', 'tqLsTyC461', 'kpAslHAro3', 'TBRs0mXYG3', 'XaosnCCvjw', 'V95s5X9mQo', 'sgys6mdxaY', 'ANssFDv9uj' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, AQMVsEnn3la4EhpHVC.cs | High entropy of concatenated method names: 'ToString', 'vlSWFHCBCP', 'pGwWTYLYwI', 'B4AWACCybk', 'dExWl7CQqQ', 'B27W0dauPg', 'LHRW9bsw8G', 'kfHWnhU15L', 'CeVW5i1JJa', 'yGQWQVgl6J' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, cehbQI9lhi7h2Uj9ar.cs | High entropy of concatenated method names: 'm6xVu4W7f6', 'Ed0VkRoYTB', 'MPViAbmbyL', 'CvuilT4JiZ', 'zdgi0dPatO', 'f7hi957cex', 'CKWinCgGSR', 'DS4i5Y3fai', 'R14iQkgBVV', 'sD7i6pQeDE' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, Anb0cYArpoKo1yhtyt.cs | High entropy of concatenated method names: 'AQZ1mmPlTu', 'DC21fdCJxA', 'HBy1xIMr4q', 'ruG1PgBDN4', 'x5p1IQ8xOe', 'Vxp1O4dokC', 'YCs1tFhHeB', 'sBZ1USMed7', 'XJK1H1CmPR', 'PCC1S0YJCQ' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, E8UpcgHPWpknOxWxSY.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'fFANHyPAKy', 'rPvNSr3HJ2', 'Up4NzUmJCw', 'qjIh2bXA7Q', 'IP1hYYioJm', 'PArhN1C0tm', 'vFFhhrdc1n', 'creMYPcjLkgm5HpBya1' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.7640000.5.raw.unpack, EIZ2dcf53pP09rW20m.cs | High entropy of concatenated method names: 'uZ88gTJ5yj', 'aPi87QVUsv', 'nLT8wsJemP', 'P5Q8pl0GSS', 'Od58uv5yqS', 'xXe8yAT0oR', 'pBd8kmE8nR', 'VCD8Bfokfi', 'IIL8DGpWpl', 'jDw8vD9B2v' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, KtckAGP4KduPbF19OL.cs | High entropy of concatenated method names: 'z3G8J5hhfq', 'xWH8igJfCg', 'z0O8M5qqCq', 'W1OMSaO6qD', 'jhLMzYbGYb', 'SGV827Cp0J', 'EEW8YdY0n5', 'Dek8NPjqJT', 'nLh8hJIfK6', 'r9J8dnwcd4' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, Qd9oHHF5356ntDR93t.cs | High entropy of concatenated method names: 'aGSZUHsYu0', 'hu6ZSripkJ', 'cExe2INvob', 'NPceY2FaOV', 'Ls0ZFHENcD', 'k4SZamPcn2', 'Ne4ZLpMY4G', 'kETZmWnqH6', 'rF5ZfD47k9', 'W5VZxUDFgN' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, dhjLZ71Qcg7PFDfiPh.cs | High entropy of concatenated method names: 'r0LipLrhvq', 'lCfiyBT9TV', 'V0IiBfrnnV', 'aV6iDiZo1A', 'LOui431L7d', 'pAriWP7lXc', 'o5WiZ9FVCK', 'zmyieWBMLr', 'l5piKyCQ1B', 'Fu2iCXbeLP' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, Vd9pFr3dyrKFhc0FTEf.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ExjCmJyfQx', 'WKWCfpxhwa', 'rJ1CxOe4wB', 'BlQCPlHyTc', 'cXhCI6v7u3', 'BTNCONyjNw', 'g0WCt8Wfxp' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, TEe4hMMB43E5tw1PaQ.cs | High entropy of concatenated method names: 'vX2eJVwk4C', 'zAte16ZSFF', 'vNSeinspWN', 'x5ieVOeFD2', 'U3SeM9LWbE', 'owLe8RFV2F', 'QFyebyoPlJ', 'CFsecwtqU9', 'mwIe3cCUMC', 'OyyeqSelFr' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, Dxgl03ctXyn07SAmmH.cs | High entropy of concatenated method names: 'tuc46qv60U', 'JyK4aACb7k', 'Owr4mgCS42', 'l694f7TWsu', 'ObA4T5XxuB', 'JJe4AV0boA', 'eSy4lKtUtJ', 'Wuf40TpHO6', 'ssL49V7t3U', 'YBG4ng6N78' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, WcK5ZwvvWKvNsa3Aub.cs | High entropy of concatenated method names: 'VOvKYlKc66', 'uMvKhhI5Wm', 'CKMKd5qTCD', 'aCxKJY7tLv', 'D0CK1D8qAO', 'b9UKVL2Hua', 'fHxKMSjf1Q', 'sPhet7IMI0', 'HVheU2c8f3', 'rhXeHTJpte' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, dDQSxhVD9kXbPF8MmU.cs | High entropy of concatenated method names: 'Dispose', 'z9nYHKSe4h', 'woXNTdrQjV', 'QtijjjIlGm', 'VokYShEDS4', 'QGEYzUA4Ex', 'ProcessDialogKey', 'DRsN2ZLCjC', 'UfHNY2ur3P', 'JDlNN2ydcs' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, uyK1WwGMfcWSqQflgQ.cs | High entropy of concatenated method names: 'YwHhowlmZc', 'T5DhJ9aj34', 'CRgh1ycAyJ', 'E5uhiCQHvv', 'pb5hVwmLfT', 'UCrhMWRgYH', 'xeNh8oVDgL', 'LXkhb22X1a', 'Kekhc3mPjy', 'IEKh33dc5x' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, NCxtIEODogvXdXdW3v.cs | High entropy of concatenated method names: 'yJY4tbK7TT', 'rBt4UJLINu', 'LY84Heq8vG', 'O6d4SWhyjK', 'HZMMfX5bGbMIp1uoPLq', 'IlETwO5iSigx6BqWpDk', 'ae9ALq5sCOXtC5rWHw7' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, kBBGMbJqa9vcwLf0Ye.cs | High entropy of concatenated method names: 'V3fwQLbiw', 'p5Op2e48J', 'SIGyPRLKl', 'tPekAcRrC', 'yI9D54O9V', 'zMsvEJx1l', 'NqDbq4d6eIlVGwKRN4', 'XOvu9egnaZBeCnLLeY', 'sNweGUOT0', 'IB4ChvNUU' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, aSVla14Vjle8v5RVC6.cs | High entropy of concatenated method names: 'KSYY8vrnsg', 'pNVYbhRO06', 'NWFY3SmfNh', 'O8nYqcreTS', 'THUY4yy3Jc', 'pgsYWUl1wC', 'Q1EtGJaj9Dhhmc2MIA', 'VP0hdQZtVE45M3jPZO', 'bPsYYgwLAH', 'zOHYhj3qsU' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, yYIsrngYJoLmkm4uHU.cs | High entropy of concatenated method names: 'AjmZ3xQv7O', 'OYvZqiGb2u', 'ToString', 'tSuZJk9ZFV', 'PLTZ1JmxX0', 'ecwZicN2l8', 'JLdZVOqHPs', 'V9bZMITSgt', 'EUTZ8iDdyI', 'GLZZbSLKiK' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, fZjjLS8rBJd637hSUC.cs | High entropy of concatenated method names: 'VN4Mo831Ul', 'iIAM15byxo', 'f8YMVbUDAs', 'TkmM8u7VKW', 'IW4MbO6Cl6', 'fKUVI2Y3rT', 'oX0VOKnBq1', 'wxMVtd0iV0', 'RbqVUQUDBA', 'WTUVHWp3RE' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, EuSdkS3YXPmAULTSjF1.cs | High entropy of concatenated method names: 'eV9Kgh7LKt', 'OnvK7Alt1Q', 'qgrKw1rWEI', 'dFYKp5bLHg', 'XgsKu6pdTF', 'g3hKyrYkrl', 'ixhKkpXXcL', 'vOnKBqpuT5', 'MSyKD6K5AB', 'XSHKvt1arp' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, SwxenDzNWdRYCNKgTj.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HYjKsvqMgb', 'QxEK4bScLU', 'pdKKWcK2X7', 'UHAKZuaX3X', 'EsfKeHLYTM', 'wkyKKX0jm9', 'wsQKCXYEUZ' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, zWGqxwycZ09tq4rIEJ.cs | High entropy of concatenated method names: 'nD1sBmnxWV', 'GVgsDTQgw6', 'vDksGZM4YV', 'tqLsTyC461', 'kpAslHAro3', 'TBRs0mXYG3', 'XaosnCCvjw', 'V95s5X9mQo', 'sgys6mdxaY', 'ANssFDv9uj' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, AQMVsEnn3la4EhpHVC.cs | High entropy of concatenated method names: 'ToString', 'vlSWFHCBCP', 'pGwWTYLYwI', 'B4AWACCybk', 'dExWl7CQqQ', 'B27W0dauPg', 'LHRW9bsw8G', 'kfHWnhU15L', 'CeVW5i1JJa', 'yGQWQVgl6J' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, cehbQI9lhi7h2Uj9ar.cs | High entropy of concatenated method names: 'm6xVu4W7f6', 'Ed0VkRoYTB', 'MPViAbmbyL', 'CvuilT4JiZ', 'zdgi0dPatO', 'f7hi957cex', 'CKWinCgGSR', 'DS4i5Y3fai', 'R14iQkgBVV', 'sD7i6pQeDE' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, Anb0cYArpoKo1yhtyt.cs | High entropy of concatenated method names: 'AQZ1mmPlTu', 'DC21fdCJxA', 'HBy1xIMr4q', 'ruG1PgBDN4', 'x5p1IQ8xOe', 'Vxp1O4dokC', 'YCs1tFhHeB', 'sBZ1USMed7', 'XJK1H1CmPR', 'PCC1S0YJCQ' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, E8UpcgHPWpknOxWxSY.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'fFANHyPAKy', 'rPvNSr3HJ2', 'Up4NzUmJCw', 'qjIh2bXA7Q', 'IP1hYYioJm', 'PArhN1C0tm', 'vFFhhrdc1n', 'creMYPcjLkgm5HpBya1' |
Source: 0.2.#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe.3bcebf0.3.raw.unpack, EIZ2dcf53pP09rW20m.cs | High entropy of concatenated method names: 'uZ88gTJ5yj', 'aPi87QVUsv', 'nLT8wsJemP', 'P5Q8pl0GSS', 'Od58uv5yqS', 'xXe8yAT0oR', 'pBd8kmE8nR', 'VCD8Bfokfi', 'IIL8DGpWpl', 'jDw8vD9B2v' |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599891 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599641 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599531 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599422 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599313 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599188 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599075 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598953 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598844 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598734 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598625 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598516 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598406 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598285 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598157 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598032 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597911 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597782 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597672 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597562 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597453 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597344 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597235 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597110 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596985 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596860 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596747 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596637 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596516 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596391 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596266 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596156 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596047 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595938 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595816 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595701 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595578 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595422 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595278 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595157 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595032 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594907 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594782 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594657 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594532 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594407 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594297 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594187 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594078 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 5420 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1812 | Thread sleep time: -6456360425798339s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep count: 33 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -30437127721620741s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 3920 | Thread sleep count: 2598 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599891s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 3920 | Thread sleep count: 7228 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599766s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599641s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599531s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599422s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599313s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599188s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -599075s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598953s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598844s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598734s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598625s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598516s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598406s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598285s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598157s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -598032s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597911s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597782s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597344s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597235s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -597110s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596985s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596860s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596747s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596637s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596516s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596391s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596266s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596156s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -596047s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595938s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595816s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595701s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595578s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595422s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595278s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595157s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -595032s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594907s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594782s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594657s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594532s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594407s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594297s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594187s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe TID: 2924 | Thread sleep time: -594078s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599891 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599641 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599531 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599422 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599313 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599188 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 599075 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598953 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598844 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598734 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598625 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598516 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598406 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598285 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598157 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 598032 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597911 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597782 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597672 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597562 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597453 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597344 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597235 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 597110 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596985 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596860 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596747 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596637 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596516 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596391 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596266 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596156 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 596047 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595938 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595816 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595701 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595578 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595422 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595278 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595157 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 595032 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594907 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594782 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594657 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594532 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594407 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594297 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594187 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Thread delayed: delay time: 594078 | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |