Windows Analysis Report
CamScanner.exe

Overview

General Information

Sample name: CamScanner.exe
Analysis ID: 1417512
MD5: 4a52e519df2dc5bfaf57aeda9b5dda0c
SHA1: ef3dd529f7c1d68d761cb82f989d8d22ac928591
SHA256: a4dc379a6ca20fa75f16c167cb516e37866b36c845eefd7bba23df27435497df
Tags: AgentTeslaexe
Infos:

Detection

AgentTesla, PureLog Stealer
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Agent Tesla, AgentTesla A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla

AV Detection

barindex
Source: 10.2.kiCBVw.exe.3990a90.4.raw.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.speedwellabrasive.com", "Username": "info@speedwellabrasive.com", "Password": "9723517720"}
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe ReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Virustotal: Detection: 47% Perma Link
Source: CamScanner.exe ReversingLabs: Detection: 63%
Source: CamScanner.exe Virustotal: Detection: 47% Perma Link
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Joe Sandbox ML: detected
Source: CamScanner.exe Joe Sandbox ML: detected
Source: CamScanner.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: CamScanner.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: VAvw.pdb source: CamScanner.exe, kiCBVw.exe.0.dr
Source: Binary string: VAvw.pdbSHA256 source: CamScanner.exe, kiCBVw.exe.0.dr
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 4x nop then jmp 029F6763h 0_2_029F6ABA
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 4x nop then jmp 04675A3Bh 10_2_04675D92

Networking

barindex
Source: Yara match File source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3d84a28.5.raw.unpack, type: UNPACKEDPE
Source: global traffic TCP traffic: 192.168.2.5:49713 -> 207.174.215.2:587
Source: Joe Sandbox View IP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox View ASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
Source: Joe Sandbox View JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknown DNS query: name: api.ipify.org
Source: unknown DNS query: name: api.ipify.org
Source: unknown DNS query: name: api.ipify.org
Source: unknown DNS query: name: api.ipify.org
Source: unknown DNS query: name: api.ipify.org
Source: unknown DNS query: name: api.ipify.org
Source: global traffic TCP traffic: 192.168.2.5:49713 -> 207.174.215.2:587
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: api.ipify.org
Source: CamScanner.exe, kiCBVw.exe.0.dr String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: CamScanner.exe, kiCBVw.exe.0.dr String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: CamScanner.exe, 00000009.00000002.4445012007.0000000002D25000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002DD1000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000003012000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.00000000035DB000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003221000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003200000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.000000000352B000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.000000000338C000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003486000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mail.speedwellabrasive.com
Source: CamScanner.exe, kiCBVw.exe.0.dr String found in binary or memory: http://ocsp.comodoca.com0
Source: CamScanner.exe, 00000009.00000002.4442131255.0000000000DC3000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4455500384.00000000064C2000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002D25000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C49000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002B8B000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4467873924.0000000007BCE000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4442131255.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4467539743.0000000007B9F000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002DD1000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000003012000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C1E000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.00000000035DB000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4443532782.0000000001503000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.000000000314B000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4456352032.0000000006AC6000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003221000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4455505894.0000000006A76000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://r3.i.lencr.org/09
Source: CamScanner.exe, 00000009.00000002.4442131255.0000000000DC3000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4455500384.00000000064C2000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002D25000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C49000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002B8B000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4467873924.0000000007BCE000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4442131255.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4467539743.0000000007B9F000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002DD1000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000003012000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C1E000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.00000000035DB000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4443532782.0000000001503000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.000000000314B000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4456352032.0000000006AC6000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003221000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4455505894.0000000006A76000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://r3.o.lencr.org0
Source: CamScanner.exe, 00000000.00000002.2021941749.0000000002AA9000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000A.00000002.2059578757.0000000002679000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003101000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: CamScanner.exe, 00000009.00000002.4442131255.0000000000DC3000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4455500384.00000000064C2000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002D25000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C49000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4455500384.0000000006525000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4467873924.0000000007BCE000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4442131255.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002DD1000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4456262564.000000000656C000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000003012000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C1E000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.00000000035DB000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4443532782.0000000001503000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4442407040.0000000001476000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4456352032.0000000006AC6000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003221000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4455505894.0000000006A76000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.000000000352B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.c.lencr.org/0
Source: CamScanner.exe, 00000009.00000002.4442131255.0000000000DC3000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4455500384.00000000064C2000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002D25000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C49000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4455500384.0000000006525000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002C57000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4467873924.0000000007BCE000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4442131255.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002DD1000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4456262564.000000000656C000.00000004.00000020.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000003012000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4468301396.0000000007C1E000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.00000000035DB000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4443532782.0000000001503000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4442407040.0000000001476000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4456352032.0000000006AC6000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003221000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4455505894.0000000006A76000.00000004.00000020.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.000000000352B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.i.lencr.org/0
Source: CamScanner.exe, 00000000.00000002.2022483581.0000000003D84000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000000.00000002.2022483581.00000000046A0000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4441557993.0000000000435000.00000040.00000400.00020000.00000000.sdmp, kiCBVw.exe, 0000000A.00000002.2060567500.0000000003956000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://account.dyn.com/
Source: CamScanner.exe, 00000000.00000002.2022483581.0000000003D84000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000000.00000002.2022483581.00000000046A0000.00000004.00000800.00020000.00000000.sdmp, CamScanner.exe, 00000009.00000002.4445012007.0000000002B4B000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000A.00000002.2060567500.0000000003956000.00000004.00000800.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4441554532.0000000000434000.00000040.00000400.00020000.00000000.sdmp, kiCBVw.exe, 0000000E.00000002.4444893587.0000000003101000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.ipify.org
Source: CamScanner.exe, kiCBVw.exe.0.dr String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49714 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 0V85.cs .Net Code: j0sMYskU
Source: 0.2.CamScanner.exe.3d84a28.5.raw.unpack, 0V85.cs .Net Code: j0sMYskU
Source: 10.2.kiCBVw.exe.3990a90.4.raw.unpack, 0V85.cs .Net Code: j0sMYskU
Source: C:\Users\user\Desktop\CamScanner.exe Windows user hook set: 0 keyboard low level C:\Users\user\Desktop\CamScanner.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Windows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\kiCBVw.exe
Source: C:\Users\user\Desktop\CamScanner.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Window created: window name: CLIPBRDWNDCLASS

System Summary

barindex
Source: 10.2.kiCBVw.exe.3990a90.4.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 0.2.CamScanner.exe.3dbf448.3.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 0.2.CamScanner.exe.3d84a28.5.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 10.2.kiCBVw.exe.3990a90.4.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 0.2.CamScanner.exe.3d84a28.5.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: C:\Users\user\Desktop\CamScanner.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_00F5E5D4 0_2_00F5E5D4
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_029F33B0 0_2_029F33B0
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_029F1710 0_2_029F1710
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_029F7C08 0_2_029F7C08
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_0717A5F0 0_2_0717A5F0
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_07176FF8 0_2_07176FF8
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_071792C8 0_2_071792C8
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_071756E9 0_2_071756E9
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_07170006 0_2_07170006
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_07177008 0_2_07177008
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_07170040 0_2_07170040
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_071798C8 0_2_071798C8
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_011141C8 9_2_011141C8
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_0111E2B9 9_2_0111E2B9
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_0111A950 9_2_0111A950
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_01114A98 9_2_01114A98
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_01113E80 9_2_01113E80
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_0675B208 9_2_0675B208
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_06752350 9_2_06752350
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_0675C170 9_2_0675C170
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_06757D48 9_2_06757D48
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_067565C0 9_2_067565C0
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_067555A0 9_2_067555A0
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_06757668 9_2_06757668
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_0675E398 9_2_0675E398
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_06750040 9_2_06750040
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_06755CC8 9_2_06755CC8
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_06750037 9_2_06750037
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_06750007 9_2_06750007
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0247E5D4 10_2_0247E5D4
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_02474B01 10_2_02474B01
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04676EF0 10_2_04676EF0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04671710 10_2_04671710
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_046733B0 10_2_046733B0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C08D80 10_2_04C08D80
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C08844 10_2_04C08844
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C0114C 10_2_04C0114C
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C0068A 10_2_04C0068A
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C00690 10_2_04C00690
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C02653 10_2_04C02653
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C0A7A0 10_2_04C0A7A0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C060B8 10_2_04C060B8
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C08D68 10_2_04C08D68
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C5FAC1 10_2_04C5FAC1
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_04C5FAD0 10_2_04C5FAD0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D1A5F0 10_2_06D1A5F0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D192C8 10_2_06D192C8
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D156E9 10_2_06D156E9
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D198C8 10_2_06D198C8
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D10040 10_2_06D10040
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D10007 10_2_06D10007
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D17008 10_2_06D17008
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_07157620 10_2_07157620
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_07150040 10_2_07150040
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0715D950 10_2_0715D950
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0715E670 10_2_0715E670
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0715E661 10_2_0715E661
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0715F528 10_2_0715F528
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_07150006 10_2_07150006
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0715F0F0 10_2_0715F0F0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_07151F98 10_2_07151F98
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0715F960 10_2_0715F960
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_0715D8F0 10_2_0715D8F0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_030AE2B9 14_2_030AE2B9
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_030A41C8 14_2_030A41C8
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_030A4A98 14_2_030A4A98
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_030A3E80 14_2_030A3E80
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_030AA950 14_2_030AA950
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC3050 14_2_06CC3050
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC65C0 14_2_06CC65C0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CCB1FA 14_2_06CCB1FA
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC55A0 14_2_06CC55A0
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC7D48 14_2_06CC7D48
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CCC170 14_2_06CCC170
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC7668 14_2_06CC7668
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CCE398 14_2_06CCE398
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC2340 14_2_06CC2340
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC5CB3 14_2_06CC5CB3
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC0040 14_2_06CC0040
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_06CC0007 14_2_06CC0007
Source: CamScanner.exe Static PE information: invalid certificate
Source: CamScanner.exe, 00000000.00000002.2028204429.0000000006FB0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs CamScanner.exe
Source: CamScanner.exe, 00000000.00000002.2028204429.0000000006FB0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameVAvw.exe( vs CamScanner.exe
Source: CamScanner.exe, 00000000.00000002.2028559160.00000000073E0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameTyrone.dll8 vs CamScanner.exe
Source: CamScanner.exe, 00000000.00000002.2022483581.0000000003D84000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamec7a5cb4b-561f-42d1-8023-d4dca9f0ec21.exe4 vs CamScanner.exe
Source: CamScanner.exe, 00000000.00000002.2022483581.0000000003D84000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameTyrone.dll8 vs CamScanner.exe
Source: CamScanner.exe, 00000000.00000000.1977967046.00000000006CA000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameVAvw.exe( vs CamScanner.exe
Source: CamScanner.exe, 00000000.00000002.2021941749.0000000002AA9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamec7a5cb4b-561f-42d1-8023-d4dca9f0ec21.exe4 vs CamScanner.exe
Source: CamScanner.exe, 00000000.00000002.2020538656.0000000000CCE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs CamScanner.exe
Source: CamScanner.exe, 00000009.00000002.4441557993.0000000000435000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: OriginalFilenamec7a5cb4b-561f-42d1-8023-d4dca9f0ec21.exe4 vs CamScanner.exe
Source: CamScanner.exe, 00000009.00000002.4442030495.0000000000CF9000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs CamScanner.exe
Source: CamScanner.exe Binary or memory string: OriginalFilenameVAvw.exe( vs CamScanner.exe
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: fastprox.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: ncobjapi.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: mpclient.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: userenv.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: version.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: msasn1.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wmitomi.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: mi.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: miutils.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: miutils.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: gpapi.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: rasapi32.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: rasman.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: rtutils.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: dhcpcsvc6.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: dhcpcsvc.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: secur32.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: vaultcli.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: edputil.dll
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Section loaded: windowscodecs.dll
Source: CamScanner.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 10.2.kiCBVw.exe.3990a90.4.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 0.2.CamScanner.exe.3dbf448.3.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 0.2.CamScanner.exe.3d84a28.5.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 10.2.kiCBVw.exe.3990a90.4.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 0.2.CamScanner.exe.3d84a28.5.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: CamScanner.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: kiCBVw.exe.0.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 4Cl.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 4Cl.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 5jodGRGeKF.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 5jodGRGeKF.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 33JmeoXaqT.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 33JmeoXaqT.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 33JmeoXaqT.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, 33JmeoXaqT.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, jXjWgdttFvGW0mcbSF.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, jXjWgdttFvGW0mcbSF.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, o770EQd2QX0Vy8NCuC.cs Security API names: _0020.SetAccessControl
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, o770EQd2QX0Vy8NCuC.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, o770EQd2QX0Vy8NCuC.cs Security API names: _0020.AddAccessRule
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, o770EQd2QX0Vy8NCuC.cs Security API names: _0020.SetAccessControl
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, o770EQd2QX0Vy8NCuC.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, o770EQd2QX0Vy8NCuC.cs Security API names: _0020.AddAccessRule
Source: 0.2.CamScanner.exe.54a0000.7.raw.unpack, ReactionVessel.cs Suspicious method names: .ReactionVessel.Inject
Source: 0.2.CamScanner.exe.2a8addc.2.raw.unpack, ReactionVessel.cs Suspicious method names: .ReactionVessel.Inject
Source: 0.2.CamScanner.exe.2a82dc4.1.raw.unpack, ReactionVessel.cs Suspicious method names: .ReactionVessel.Inject
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@19/15@4/2
Source: C:\Users\user\Desktop\CamScanner.exe File created: C:\Users\user\AppData\Roaming\kiCBVw.exe Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7332:120:WilError_03
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7268:120:WilError_03
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Mutant created: \Sessions\1\BaseNamedObjects\WrjqlddzlBFhrooYpsQCVl
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7940:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
Source: C:\Users\user\Desktop\CamScanner.exe File created: C:\Users\user\AppData\Local\Temp\tmpF4D3.tmp Jump to behavior
Source: CamScanner.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: CamScanner.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: CamScanner.exe ReversingLabs: Detection: 63%
Source: CamScanner.exe Virustotal: Detection: 47%
Source: C:\Users\user\Desktop\CamScanner.exe File read: C:\Users\user\Desktop\CamScanner.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\CamScanner.exe "C:\Users\user\Desktop\CamScanner.exe"
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CamScanner.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kiCBVw.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmpF4D3.tmp"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Users\user\Desktop\CamScanner.exe "C:\Users\user\Desktop\CamScanner.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\kiCBVw.exe C:\Users\user\AppData\Roaming\kiCBVw.exe
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmp56D.tmp"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process created: C:\Users\user\AppData\Roaming\kiCBVw.exe "C:\Users\user\AppData\Roaming\kiCBVw.exe"
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CamScanner.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kiCBVw.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmpF4D3.tmp" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Users\user\Desktop\CamScanner.exe "C:\Users\user\Desktop\CamScanner.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmp56D.tmp" Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process created: C:\Users\user\AppData\Roaming\kiCBVw.exe "C:\Users\user\AppData\Roaming\kiCBVw.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\CamScanner.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\Profiles Jump to behavior
Source: CamScanner.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: CamScanner.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: CamScanner.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: VAvw.pdb source: CamScanner.exe, kiCBVw.exe.0.dr
Source: Binary string: VAvw.pdbSHA256 source: CamScanner.exe, kiCBVw.exe.0.dr

Data Obfuscation

barindex
Source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, AJO8kvyDr8qxYWB5Qt.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
Source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, AJO8kvyDr8qxYWB5Qt.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
Source: CamScanner.exe, Menu.cs .Net Code: InitializeComponent System.AppDomain.Load(byte[])
Source: kiCBVw.exe.0.dr, Menu.cs .Net Code: InitializeComponent System.AppDomain.Load(byte[])
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, o770EQd2QX0Vy8NCuC.cs .Net Code: L4M3qLTQrW System.Reflection.Assembly.Load(byte[])
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, o770EQd2QX0Vy8NCuC.cs .Net Code: L4M3qLTQrW System.Reflection.Assembly.Load(byte[])
Source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, I1Ds3abkUA5mh3kywv.cs .Net Code: hyVW2X9uL System.Reflection.Assembly.Load(byte[])
Source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, I1Ds3abkUA5mh3kywv.cs .Net Code: hyVW2X9uL System.Reflection.Assembly.Load(byte[])
Source: CamScanner.exe Static PE information: 0xFA06C7BB [Tue Dec 5 07:52:27 2102 UTC]
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_029F27FA pushfd ; ret 0_2_029F27FD
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 0_2_07173644 push cs; retf 0_2_07173647
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_01110B4D push edi; ret 9_2_01110CC2
Source: C:\Users\user\Desktop\CamScanner.exe Code function: 9_2_01110C95 push edi; retf 9_2_01110C3A
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_046727FA pushfd ; ret 10_2_046727FD
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 10_2_06D13644 push cs; retf 10_2_06D13647
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Code function: 14_2_030A0C3D push edi; ret 14_2_030A0CC2
Source: CamScanner.exe Static PE information: section name: .text entropy: 7.959682115010499
Source: kiCBVw.exe.0.dr Static PE information: section name: .text entropy: 7.959682115010499
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, zaHiBjTLBQ2OnWAEN9.cs High entropy of concatenated method names: 'PealdXR0Gs', 'IMTlms6FdR', 'Iw2lCytYWl', 'aY8losMkD1', 'wTClyTFhl5', 'nKOlQTN6CV', 'Next', 'Next', 'Next', 'NextBytes'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, ygvkuvYOCdpuaWDCSg.cs High entropy of concatenated method names: 'uLIlxYhavG', 'DTVlTHImF2', 'w9dlnlBMIQ', 'kn0lsEVVTN', 'Ua5ltxgXKT', 'dDWleBLFRD', 'oaylOT1k7x', 'aprlhyodCr', 'kpslAulhX1', 'jVclWAGxGn'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, wO0jwDrG1dpvOyTaon.cs High entropy of concatenated method names: 'l5vfRInoyV', 'Ualf9lbgHi', 'IWdf37OPC0', 'sYufxVsE90', 'M9LfTU7pjM', 'GjHfsIOuD0', 'Bwcft3XueP', 'CSslMNitPC', 'Y1XlbiMpow', 'n4alrtmyR5'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, d3qKIKbmTXLATOuhPn5.cs High entropy of concatenated method names: 'MBhg86aJGi', 'GSHgJF7ZOv', 'slAgqDZDVi', 'Y62SQN4tFetjfoy9Cok', 'LfsRfx4XVIA5JCyuh9v', 'zVgQrW4d8lB7fHc7gyf', 'XpxTH94eBvvrCZm1jD8'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, r4F8sgnLmw1p4HIQFx.cs High entropy of concatenated method names: 'XSKe8dCNgu', 'HlHeJ8BHxO', 'njDeqmRmqd', 'PIXeEL6HBg', 'PceepTHZxh', 'qSDeYrExbW', 'iRjeDFRTea', 'G05ecmKS2S', 'EeFeXl0n6D', 'us2eNL7156'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, N1keoEilkkVYIe0rXY.cs High entropy of concatenated method names: 'RtQkbAM24V', 'Ug8kKTuev6', 'SkSlURRiCS', 'jBulRmoJJn', 'OOxkLST57g', 'B1Zk11BYCO', 'rEakSqRv1R', 'UFSkyXV8yq', 's04k55vHXJ', 'LxfkuQf3Hr'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, uVYiMj4TWBS9MmcM3c.cs High entropy of concatenated method names: 'Dispose', 'P5ORrLifGD', 'earGm7Rx2V', 'zUVIIpr80y', 'PPGRKp7NQX', 'G4cRz7Mi8x', 'ProcessDialogKey', 'MytGUBUXLt', 'Ym5GRJ155n', 'wRoGG1qkyd'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, MIrX4rmqaZtnAAKgaJ.cs High entropy of concatenated method names: 'CB5qZelkV', 'EhAEtaGvD', 'uDkYxYdDb', 'jdoDxuXTM', 'zK3XybLw8', 'FJQNqdjU9', 'KEls4bdsfb95RoC20m', 'DiCiOXedNlYA7kXSu0', 'aHLlin6n7', 'Rpqgyx1DB'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, Dq8x9QwHhV5LdhfRDL.cs High entropy of concatenated method names: 'u0jkADGbay', 'N9IkWA4ETo', 'ToString', 'y5QkxMfqQD', 'geakTVQfEr', 'fIYknts36G', 'jIBks7rRhT', 'gxxktM9FKC', 'pPSkeseI15', 'f4rkOm4wSo'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, JZWEGK8S4husACxFB2.cs High entropy of concatenated method names: 'nbNnEFM0vH', 'kMVnYkOFkH', 'ISfncHV8rg', 'iWWnX2uBu8', 'lLtnPWgtAT', 'G74nj5Y1N8', 'Gojnkj5iW3', 'wdanl3NpIu', 'wk7nfm1g7g', 'Y7Fng5YR6Z'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, LZ7e5sZg3iKcI3fHcG.cs High entropy of concatenated method names: 'TtFPiVKAbf', 'N3LP176Jei', 'oCqPy64SI1', 'B0lP5JkoBJ', 'RCVPmPUhkf', 'KWxPCg97FJ', 'XBfPoYyMxp', 'OdmPQCMduY', 'wEIP77fqWW', 'qcQP4TjjUr'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, o770EQd2QX0Vy8NCuC.cs High entropy of concatenated method names: 'wxU9wvyrsY', 'rhT9xYMyJq', 'vZH9TGKvhW', 'oxc9nUACZY', 'L039sDmBBA', 'c4V9tq9ray', 'kwy9eDGHOI', 'Huv9O1EqmX', 'rmu9hr7pme', 'Qob9AC68s2'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, b6ZU8RomHJK5YxZVcy.cs High entropy of concatenated method names: 'ht3ReV9diq', 'uOdROGDRPN', 'uFiRAARdQV', 'aCeRW6GLPr', 'dRLRPkr3pC', 'AagRjIpQlm', 'XRGIlOVEJqARUU4B6O', 'is2wF683aV8YWUKUZd', 'Pt3RR6PPxH', 'CToR9CPrgk'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, deFKX5z5R33lyw694o.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lp4fBxcHn5', 'liAfPAhIFH', 's9QfjjX3yV', 'FPGfkqgRZy', 'lJ4fltmFlb', 'OyxffIsK8m', 'E5PfgFDiJZ'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, IcTWU3A8Qd7w6luRy5.cs High entropy of concatenated method names: 'KCtexb6jdt', 'Wk9en1w4KJ', 'L0GetmqZkb', 'MxStKh54qD', 'DistzAZslQ', 'KsreUEV9AY', 'yLheR1Ge6O', 'DqjeGpHdGf', 'iwpe9c3vHf', 'dTAe39ENHd'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, T2b4G2b6Bo3QfLUMcve.cs High entropy of concatenated method names: 'BEtf8vm5hj', 'bdGfJhKM6s', 'Q1Ufqda5PO', 'U5XfEAs4Q0', 'aRXfpqIx6o', 'RJAfYaCeSR', 'QZbfDWYclM', 'HTJfc1WfXL', 'iCZfXJUXLN', 'NN6fNgKfYw'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, TWShURcYB5YKyyqfxc.cs High entropy of concatenated method names: 'AycBcwP1Vk', 'tvkBX5hYGM', 'Hi8BdRT3an', 'Um6BmSbHUj', 'UfUBoIaXEO', 'kgdBQgJxSm', 'D5KB4rFuFI', 'IIPBH3dWiX', 'eP3Bi6Ikme', 'tZjBL9EZjX'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, qDOyRkhZYmymyYuRSY.cs High entropy of concatenated method names: 'HuFtwUqNga', 'hjRtT1iHF7', 'BaltsaqMIr', 'ziftepOvlx', 'pH2tOjvK17', 'LDPs0Sq9UR', 'pWvsZKIUw2', 'XwLsM4J8MY', 'cKUsbWXxuF', 'mHwsrvEBfL'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, jXjWgdttFvGW0mcbSF.cs High entropy of concatenated method names: 'qDATyF2WHy', 'YcTT5QX4Ot', 'FvsTuZPIkg', 'VbkTvQAcfd', 'BCTT0kNs57', 'vOATZUPWTW', 'du2TMhPuKV', 'B0wTbA19RV', 'eABTrENkXS', 'NIZTKMdDO3'
Source: 0.2.CamScanner.exe.73e0000.8.raw.unpack, onyqsJbPrX1enqrPwcS.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'I5ZgyNUWiU', 'dWVg5yg6Bo', 'j3wguGZXfC', 'P60gvx3X4f', 'M8gg0P8hPK', 'FOtgZNCPDk', 'aLggMnEqq0'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, zaHiBjTLBQ2OnWAEN9.cs High entropy of concatenated method names: 'PealdXR0Gs', 'IMTlms6FdR', 'Iw2lCytYWl', 'aY8losMkD1', 'wTClyTFhl5', 'nKOlQTN6CV', 'Next', 'Next', 'Next', 'NextBytes'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, ygvkuvYOCdpuaWDCSg.cs High entropy of concatenated method names: 'uLIlxYhavG', 'DTVlTHImF2', 'w9dlnlBMIQ', 'kn0lsEVVTN', 'Ua5ltxgXKT', 'dDWleBLFRD', 'oaylOT1k7x', 'aprlhyodCr', 'kpslAulhX1', 'jVclWAGxGn'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, wO0jwDrG1dpvOyTaon.cs High entropy of concatenated method names: 'l5vfRInoyV', 'Ualf9lbgHi', 'IWdf37OPC0', 'sYufxVsE90', 'M9LfTU7pjM', 'GjHfsIOuD0', 'Bwcft3XueP', 'CSslMNitPC', 'Y1XlbiMpow', 'n4alrtmyR5'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, d3qKIKbmTXLATOuhPn5.cs High entropy of concatenated method names: 'MBhg86aJGi', 'GSHgJF7ZOv', 'slAgqDZDVi', 'Y62SQN4tFetjfoy9Cok', 'LfsRfx4XVIA5JCyuh9v', 'zVgQrW4d8lB7fHc7gyf', 'XpxTH94eBvvrCZm1jD8'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, r4F8sgnLmw1p4HIQFx.cs High entropy of concatenated method names: 'XSKe8dCNgu', 'HlHeJ8BHxO', 'njDeqmRmqd', 'PIXeEL6HBg', 'PceepTHZxh', 'qSDeYrExbW', 'iRjeDFRTea', 'G05ecmKS2S', 'EeFeXl0n6D', 'us2eNL7156'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, N1keoEilkkVYIe0rXY.cs High entropy of concatenated method names: 'RtQkbAM24V', 'Ug8kKTuev6', 'SkSlURRiCS', 'jBulRmoJJn', 'OOxkLST57g', 'B1Zk11BYCO', 'rEakSqRv1R', 'UFSkyXV8yq', 's04k55vHXJ', 'LxfkuQf3Hr'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, uVYiMj4TWBS9MmcM3c.cs High entropy of concatenated method names: 'Dispose', 'P5ORrLifGD', 'earGm7Rx2V', 'zUVIIpr80y', 'PPGRKp7NQX', 'G4cRz7Mi8x', 'ProcessDialogKey', 'MytGUBUXLt', 'Ym5GRJ155n', 'wRoGG1qkyd'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, MIrX4rmqaZtnAAKgaJ.cs High entropy of concatenated method names: 'CB5qZelkV', 'EhAEtaGvD', 'uDkYxYdDb', 'jdoDxuXTM', 'zK3XybLw8', 'FJQNqdjU9', 'KEls4bdsfb95RoC20m', 'DiCiOXedNlYA7kXSu0', 'aHLlin6n7', 'Rpqgyx1DB'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, Dq8x9QwHhV5LdhfRDL.cs High entropy of concatenated method names: 'u0jkADGbay', 'N9IkWA4ETo', 'ToString', 'y5QkxMfqQD', 'geakTVQfEr', 'fIYknts36G', 'jIBks7rRhT', 'gxxktM9FKC', 'pPSkeseI15', 'f4rkOm4wSo'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, JZWEGK8S4husACxFB2.cs High entropy of concatenated method names: 'nbNnEFM0vH', 'kMVnYkOFkH', 'ISfncHV8rg', 'iWWnX2uBu8', 'lLtnPWgtAT', 'G74nj5Y1N8', 'Gojnkj5iW3', 'wdanl3NpIu', 'wk7nfm1g7g', 'Y7Fng5YR6Z'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, LZ7e5sZg3iKcI3fHcG.cs High entropy of concatenated method names: 'TtFPiVKAbf', 'N3LP176Jei', 'oCqPy64SI1', 'B0lP5JkoBJ', 'RCVPmPUhkf', 'KWxPCg97FJ', 'XBfPoYyMxp', 'OdmPQCMduY', 'wEIP77fqWW', 'qcQP4TjjUr'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, o770EQd2QX0Vy8NCuC.cs High entropy of concatenated method names: 'wxU9wvyrsY', 'rhT9xYMyJq', 'vZH9TGKvhW', 'oxc9nUACZY', 'L039sDmBBA', 'c4V9tq9ray', 'kwy9eDGHOI', 'Huv9O1EqmX', 'rmu9hr7pme', 'Qob9AC68s2'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, b6ZU8RomHJK5YxZVcy.cs High entropy of concatenated method names: 'ht3ReV9diq', 'uOdROGDRPN', 'uFiRAARdQV', 'aCeRW6GLPr', 'dRLRPkr3pC', 'AagRjIpQlm', 'XRGIlOVEJqARUU4B6O', 'is2wF683aV8YWUKUZd', 'Pt3RR6PPxH', 'CToR9CPrgk'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, deFKX5z5R33lyw694o.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lp4fBxcHn5', 'liAfPAhIFH', 's9QfjjX3yV', 'FPGfkqgRZy', 'lJ4fltmFlb', 'OyxffIsK8m', 'E5PfgFDiJZ'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, IcTWU3A8Qd7w6luRy5.cs High entropy of concatenated method names: 'KCtexb6jdt', 'Wk9en1w4KJ', 'L0GetmqZkb', 'MxStKh54qD', 'DistzAZslQ', 'KsreUEV9AY', 'yLheR1Ge6O', 'DqjeGpHdGf', 'iwpe9c3vHf', 'dTAe39ENHd'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, T2b4G2b6Bo3QfLUMcve.cs High entropy of concatenated method names: 'BEtf8vm5hj', 'bdGfJhKM6s', 'Q1Ufqda5PO', 'U5XfEAs4Q0', 'aRXfpqIx6o', 'RJAfYaCeSR', 'QZbfDWYclM', 'HTJfc1WfXL', 'iCZfXJUXLN', 'NN6fNgKfYw'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, TWShURcYB5YKyyqfxc.cs High entropy of concatenated method names: 'AycBcwP1Vk', 'tvkBX5hYGM', 'Hi8BdRT3an', 'Um6BmSbHUj', 'UfUBoIaXEO', 'kgdBQgJxSm', 'D5KB4rFuFI', 'IIPBH3dWiX', 'eP3Bi6Ikme', 'tZjBL9EZjX'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, qDOyRkhZYmymyYuRSY.cs High entropy of concatenated method names: 'HuFtwUqNga', 'hjRtT1iHF7', 'BaltsaqMIr', 'ziftepOvlx', 'pH2tOjvK17', 'LDPs0Sq9UR', 'pWvsZKIUw2', 'XwLsM4J8MY', 'cKUsbWXxuF', 'mHwsrvEBfL'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, jXjWgdttFvGW0mcbSF.cs High entropy of concatenated method names: 'qDATyF2WHy', 'YcTT5QX4Ot', 'FvsTuZPIkg', 'VbkTvQAcfd', 'BCTT0kNs57', 'vOATZUPWTW', 'du2TMhPuKV', 'B0wTbA19RV', 'eABTrENkXS', 'NIZTKMdDO3'
Source: 0.2.CamScanner.exe.3e24190.4.raw.unpack, onyqsJbPrX1enqrPwcS.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'I5ZgyNUWiU', 'dWVg5yg6Bo', 'j3wguGZXfC', 'P60gvx3X4f', 'M8gg0P8hPK', 'FOtgZNCPDk', 'aLggMnEqq0'
Source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, R87QTajabri3WprdxA.cs High entropy of concatenated method names: 'SoFXXYTXBr', 'VXePqW7LxoGttIrQMM', 'VJKqh4rSy8UE5CPs2d', 'w7T6rNymrPsVe05ZjX', 'Qa5usbZfG', 'UsaN6r2JI', 'Dispose', 'xdE70OV1R', 'WKG8Nh2TLfQX7DMBJq', 'FCyDZoO16YhsTUYx7V'
Source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, I1Ds3abkUA5mh3kywv.cs High entropy of concatenated method names: 'I6pnpGMEc', 'pUPSoKeTB', 'w3OonGh86', 'S3aaCOvyF', 'MagvcleIh', 'hvmph4XfL', 'eXtqEM8mO', 'RC38AH4Bb', 'hyVW2X9uL', 'AbHynsT40'
Source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, AJO8kvyDr8qxYWB5Qt.cs High entropy of concatenated method names: 'sRJJ4PC1lt6MgSX9oLN', 'qCuPUJCYMdGJYrcKdqj', 'T9OMNMJAsS', 'KH71sVC96gudd8OjhqS', 'qSoaq8CnboJYXbPCm1H', 'XtbiVDCeUWVlZdG2V08', 'D2TFRiCIaLSytg31rTE', 'MtxGm4CM57HGXUKQMIN', 'RgtTUJcyZL', 'eFmMT9Tlnp'
Source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, QEHxtuXFnnkJABhbAo.cs High entropy of concatenated method names: 'Geosg7Hdn', 'wwIBOnTmd', 'siWV4YECO', 'k32FNitut', 'cUAG5mh3k', 'JwvHwu9Dw', 'cr1hyajqeLqaQ4F9dK', 'Pgut89mcfAIn6Hs5oN', 'Dispose', 'MoveNext'
Source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, R87QTajabri3WprdxA.cs High entropy of concatenated method names: 'SoFXXYTXBr', 'VXePqW7LxoGttIrQMM', 'VJKqh4rSy8UE5CPs2d', 'w7T6rNymrPsVe05ZjX', 'Qa5usbZfG', 'UsaN6r2JI', 'Dispose', 'xdE70OV1R', 'WKG8Nh2TLfQX7DMBJq', 'FCyDZoO16YhsTUYx7V'
Source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, I1Ds3abkUA5mh3kywv.cs High entropy of concatenated method names: 'I6pnpGMEc', 'pUPSoKeTB', 'w3OonGh86', 'S3aaCOvyF', 'MagvcleIh', 'hvmph4XfL', 'eXtqEM8mO', 'RC38AH4Bb', 'hyVW2X9uL', 'AbHynsT40'
Source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, AJO8kvyDr8qxYWB5Qt.cs High entropy of concatenated method names: 'sRJJ4PC1lt6MgSX9oLN', 'qCuPUJCYMdGJYrcKdqj', 'T9OMNMJAsS', 'KH71sVC96gudd8OjhqS', 'qSoaq8CnboJYXbPCm1H', 'XtbiVDCeUWVlZdG2V08', 'D2TFRiCIaLSytg31rTE', 'MtxGm4CM57HGXUKQMIN', 'RgtTUJcyZL', 'eFmMT9Tlnp'
Source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, QEHxtuXFnnkJABhbAo.cs High entropy of concatenated method names: 'Geosg7Hdn', 'wwIBOnTmd', 'siWV4YECO', 'k32FNitut', 'cUAG5mh3k', 'JwvHwu9Dw', 'cr1hyajqeLqaQ4F9dK', 'Pgut89mcfAIn6Hs5oN', 'Dispose', 'MoveNext'
Source: C:\Users\user\Desktop\CamScanner.exe File created: C:\Users\user\AppData\Roaming\kiCBVw.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmpF4D3.tmp"
Source: C:\Users\user\Desktop\CamScanner.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: CamScanner.exe PID: 4368, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiCBVw.exe PID: 7668, type: MEMORYSTR
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: F20000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 2A40000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 2990000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 7AD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 8AD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 8D90000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 9D90000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 10D0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 2B40000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: 28D0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 2470000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 2610000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 4610000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 74E0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 84E0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 8690000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 9690000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 3060000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 3100000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory allocated: 5100000 memory reserve | memory write watch
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539922 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539812 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539703 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539593 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539484 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539375 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539265 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539156 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539047 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538937 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538827 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538718 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538609 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538485 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538359 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538250 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538140 Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539937
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539828
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539719
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539608
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539500
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539391
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539281
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539172
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539063
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538953
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538844
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538734
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538625
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538516
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538406
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538283
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538157
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538047
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537922
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537813
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537688
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537578
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 5349 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 4979 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Window / User API: threadDelayed 2424 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Window / User API: threadDelayed 7410 Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Window / User API: threadDelayed 8633
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Window / User API: threadDelayed 1227
Source: C:\Users\user\Desktop\CamScanner.exe TID: 5696 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7404 Thread sleep count: 5349 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7604 Thread sleep time: -1844674407370954s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7384 Thread sleep count: 164 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7528 Thread sleep time: -1844674407370954s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7636 Thread sleep time: -3689348814741908s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7540 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -31359464925306218s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -100000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99891s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99781s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99672s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99563s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99438s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99328s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99216s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99109s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -99000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98891s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98766s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98656s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98547s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98438s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98313s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98188s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -98078s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97969s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97844s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97735s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97610s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97485s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97360s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97235s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -97110s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -96985s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -96860s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -96735s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -96610s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -96485s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -96360s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -96235s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539922s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539812s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539703s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539593s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539484s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539375s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539265s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539156s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3539047s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538937s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538827s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538718s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538609s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538485s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538359s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538250s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe TID: 7888 Thread sleep time: -3538140s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 7760 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -26747778906878833s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -100000s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99890s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99781s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99671s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99562s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99452s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99343s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99234s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99124s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -99015s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98905s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98796s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98687s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98578s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98445s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98328s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98218s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -98109s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97999s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97890s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97781s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97671s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97562s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97453s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97343s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97234s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97124s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -97015s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539937s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539828s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539719s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539608s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539500s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539391s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539281s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539172s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3539063s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538953s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538844s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538734s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538625s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538516s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538406s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538283s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538157s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3538047s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3537922s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3537813s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3537688s >= -30000s
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe TID: 8080 Thread sleep time: -3537578s >= -30000s
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\CamScanner.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 100000 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99891 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99781 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99672 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99563 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99438 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99328 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99216 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99109 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 99000 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98891 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98766 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98656 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98547 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98438 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98313 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98188 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 98078 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97969 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97844 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97735 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97610 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97485 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97360 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97235 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 97110 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 96985 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 96860 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 96735 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 96610 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 96485 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 96360 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 96235 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539922 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539812 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539703 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539593 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539484 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539375 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539265 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539156 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3539047 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538937 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538827 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538718 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538609 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538485 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538359 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538250 Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Thread delayed: delay time: 3538140 Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 100000
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99890
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99781
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99671
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99562
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99452
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99343
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99234
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99124
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 99015
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98905
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98796
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98687
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98578
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98445
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98328
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98218
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 98109
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97999
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97890
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97781
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97671
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97562
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97453
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97343
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97234
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97124
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 97015
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539937
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539828
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539719
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539608
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539500
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539391
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539281
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539172
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3539063
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538953
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538844
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538734
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538625
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538516
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538406
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538283
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538157
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3538047
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537922
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537813
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537688
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Thread delayed: delay time: 3537578
Source: kiCBVw.exe, 0000000A.00000002.2058572782.0000000000993000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: kiCBVw.exe, 0000000E.00000002.4443532782.0000000001503000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"X
Source: kiCBVw.exe, 0000000A.00000002.2063819090.00000000072BC000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}uu
Source: CamScanner.exe, 00000009.00000002.4442131255.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\CamScanner.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CamScanner.exe"
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kiCBVw.exe"
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CamScanner.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kiCBVw.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Memory written: C:\Users\user\Desktop\CamScanner.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Memory written: C:\Users\user\AppData\Roaming\kiCBVw.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CamScanner.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kiCBVw.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmpF4D3.tmp" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Process created: C:\Users\user\Desktop\CamScanner.exe "C:\Users\user\Desktop\CamScanner.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmp56D.tmp" Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Process created: C:\Users\user\AppData\Roaming\kiCBVw.exe "C:\Users\user\AppData\Roaming\kiCBVw.exe" Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Users\user\Desktop\CamScanner.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Users\user\Desktop\CamScanner.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Users\user\AppData\Roaming\kiCBVw.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Users\user\AppData\Roaming\kiCBVw.exe VolumeInformation
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\CamScanner.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 10.2.kiCBVw.exe.3990a90.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3dbf448.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3d84a28.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.kiCBVw.exe.3990a90.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3d84a28.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000E.00000002.4444893587.000000000314B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.4441557993.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2060567500.0000000003956000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2022483581.0000000003D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.4445012007.0000000002B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2022483581.00000000046A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: CamScanner.exe PID: 4368, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: CamScanner.exe PID: 7548, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiCBVw.exe PID: 7668, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiCBVw.exe PID: 7988, type: MEMORYSTR
Source: Yara match File source: 0.2.CamScanner.exe.52d0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.kiCBVw.exe.2636678.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.2a66660.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.kiCBVw.exe.2636678.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.2027563044.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2059578757.0000000002611000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2021941749.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\CamScanner.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Users\user\Desktop\CamScanner.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles Jump to behavior
Source: C:\Users\user\Desktop\CamScanner.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
Source: C:\Users\user\AppData\Roaming\kiCBVw.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
Source: Yara match File source: 10.2.kiCBVw.exe.3990a90.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3dbf448.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3d84a28.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.kiCBVw.exe.3990a90.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3d84a28.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000E.00000002.4444893587.000000000314B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.4441557993.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2060567500.0000000003956000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2022483581.0000000003D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.4445012007.0000000002B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2022483581.00000000046A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: CamScanner.exe PID: 4368, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: CamScanner.exe PID: 7548, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiCBVw.exe PID: 7668, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiCBVw.exe PID: 7988, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 10.2.kiCBVw.exe.3990a90.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3dbf448.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3d84a28.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.kiCBVw.exe.3990a90.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3dbf448.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.3d84a28.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000E.00000002.4444893587.000000000314B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.4441557993.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2060567500.0000000003956000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2022483581.0000000003D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.4445012007.0000000002B8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2022483581.00000000046A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: CamScanner.exe PID: 4368, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: CamScanner.exe PID: 7548, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiCBVw.exe PID: 7668, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiCBVw.exe PID: 7988, type: MEMORYSTR
Source: Yara match File source: 0.2.CamScanner.exe.52d0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.52d0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.2a66660.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.kiCBVw.exe.2636678.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.CamScanner.exe.2a66660.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.kiCBVw.exe.2636678.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.2027563044.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2059578757.0000000002611000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2021941749.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs