Windows Analysis Report
Document.doc.scr.exe

Overview

General Information

Sample name: Document.doc.scr.exe
Analysis ID: 1431430
MD5: b7b4c97132d03eead1fa9a9352dee6c2
SHA1: c9eb1bdc528076fa9c91668addf0723294ac1575
SHA256: 1ecea8b0bc92378bf2bdd1c14ae1628c573569419b91cc34504d2c3f8bb9f8b2
Tags: exe
Infos:

Detection

LockBit ransomware, TrojanRansom
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found ransom note / readme
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected LockBit ransomware
Yara detected TrojanRansom
Changes the wallpaper picture
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Deletes itself after installation
Found Tor onion address
Found potential ransomware demand text
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Overwrites Mozilla Firefox settings
Sample has a suspicious name (potential lure to open the executable)
Tries to harvest and steal browser information (history, passwords, etc)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes many files with high entropy
Writes to foreign memory regions
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Enables security privileges
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potentially Suspicious Desktop Background Change Via Registry
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection

barindex
Source: Document.doc.scr.exe Avira: detected
Source: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion Avira URL Cloud: Label: malware
Source: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion Virustotal: Detection: 12% Perma Link
Source: Document.doc.scr.exe Virustotal: Detection: 78% Perma Link
Source: Document.doc.scr.exe Joe Sandbox ML: detected
Source: Document.doc.scr.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Videos\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Searches\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Saved Games\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Recent\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Pictures\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Pictures\Saved Pictures\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Pictures\Camera Roll\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\OneDrive\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Music\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Links\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Favorites\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Favorites\Links\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Downloads\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\ZBEDCJPBEY\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\WKXEWIOTXI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\SQRKHNBNYN\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\ONBQCLYSPU\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\KZWFNRXYKI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\KATAXZVCPS\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\HTAGVDFUIE\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\DTBZGIOOSO\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\AIXACVYBSB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\ZBEDCJPBEY\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\WKXEWIOTXI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\SQRKHNBNYN\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\ONBQCLYSPU\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\KZWFNRXYKI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\KATAXZVCPS\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\HTAGVDFUIE\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\DTBZGIOOSO\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\AIXACVYBSB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Contacts\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Skype\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Skype\RootTools\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\to-be-removed\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\temporary\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\security_state\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\minidumps\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\tmp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\db\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\bookmarkbackups\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Pending Pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Crash Reports\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Crash Reports\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Extensions\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\f2eb6c79-671d-4de2-b7be-3b2eea7abc47\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\6d9d9777-7ded-4768-8191-9a707d72b009\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\61f56613-c62c-4b17-84dd-62b60d5776aa\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\56079431-ea46-4833-94f9-1ff5658cdb1c\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Sonar\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Sonar\SonarCC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\RTTransfer\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\LogTransport2CC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\LogTransport2\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Linguistics\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Headlights\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Flash Player\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Flash Player\NativeCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\CRLogs\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\CRLogs\crashlogs\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\Preflight Acrobat Continuous\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Forms\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Collab\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Linguistics\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cookie\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\VideoDecodeStats\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\metadata\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\d1702bdf-c0c8-42c3-b6d9-e52fd0a57b16\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\assets\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\DesktopNotification\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\DesktopNotification\NotificationsDB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\VirtualStore\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\mozilla-temp-files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Low\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Diagnostics\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\DC\SearchEmbdIndex\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrocef_low\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\SolidDocuments\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\SolidDocuments\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\SettingsContainer\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\Microsoft.WindowsAlarms\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\Licenses\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\Fonts\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\PlaceholderTileLogoFolder\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\PeerDistRepub\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\LocalState\DiagOutputDir\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AC\BackgroundTransferApi\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\Flighting\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{97b27011-f8cc-4ac9-9531-d6ee8ce92324}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{76cc83ea-ae96-47fc-9329-459e5ad2d67b}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{0f31ce30-ed3d-4588-b294-208da23711e6}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{bf219d98-b737-4343-a3eb-cfe34ee6bd79}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{2c33d893-bc92-487f-aede-304ebfc79509}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\CacheStorage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: Document.doc.scr.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\te8ZzuVLn.README.txt[N0h source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1679051238.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error.te8ZzuVLn.txt+I source: Document.doc.scr.exe, 00000000.00000003.1691524981.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1692610971.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1679051238.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1690809071.0000000001503000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1689479201.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: Document.doc.scr.exe, 00000000.00000003.1694408467.00000000014F5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorI source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001537000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\te8ZzuVLn.README.txt source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: Document.doc.scr.exe, 00000000.00000003.1694408467.00000000014F5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb:UZh source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\te8ZzuVLn.README.txt source: Document.doc.scr.exe, 00000000.00000003.1673702635.000000000151F000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1679051238.000000000151F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.erroru source: Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \Device\HarddiskVolume3\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ownload.errornHI i source: Document.doc.scr.exe, 00000000.00000003.1679051238.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error- source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A374BC FindFirstFileExW,FindNextFileW, 0_2_00A374BC
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3A094 FindFirstFileExW,FindClose, 0_2_00A3A094
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A35C24 FindFirstFileW,FindClose,FindNextFileW,FindClose, 0_2_00A35C24
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A37590 FindFirstFileExW,FindClose, 0_2_00A37590
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3766C FindFirstFileExW,GetFileAttributesW,FindNextFileW, 0_2_00A3766C
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3F308 GetFileAttributesW,SetThreadPriority,FindFirstFileExW,FindNextFileW,FindClose, 0_2_00A3F308
Source: C:\ProgramData\9A51.tmp Code function: 9_2_0040227C FindFirstFileExW, 9_2_0040227C
Source: C:\ProgramData\9A51.tmp Code function: 9_2_0040152C FindFirstFileExW,FindClose,FindNextFileW,FindClose, 9_2_0040152C
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A37468 GetLogicalDriveStringsW,GetDriveTypeW, 0_2_00A37468
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\Diagnostics\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\DC\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\ Jump to behavior

Networking

barindex
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionKMyh
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onionin$MDh
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion1MSh
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onioned
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionic
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionc
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionl
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onionc
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionl
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionwB
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion@B`i
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion]BOi
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion].BZi
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion;B)i
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionc
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onional
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionlB
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionKMyh
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onionin$MDh
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion1MSh
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onioned
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionic
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionc
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionl
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onionc
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionl
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionwB
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion@B`i
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion]BOi
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion].BZi
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion;B)i
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionc
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onional
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionlA
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: http://b.c2r.ts.cdn.office.net/pr
Source: Document.doc.scr.exe, 00000000.00000003.1669841059.0000000001627000.00000004.00000020.00020000.00000000.sdmp, 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt.uz
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion1MSh
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionc
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionic
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionl
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onionwB
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion;B)i
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionKMyh
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onional
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionc
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionl
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionlA
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onionlB
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onionc
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onioned
Source: Document.doc.scr.exe, 00000000.00000003.2049508869.0000000001507000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.0000000001500000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onionin$MDh
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://lockbitsupp.uz
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: http://weather.service.msn.com/data.aspx
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinsinstallation.store.office.com/app/download
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinslicensing.store.office.com/apps/remove
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinslicensing.store.office.com/commerce/query
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://allegro.pl/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://analysis.windows.net/powerbi/api
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.aadrm.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.aadrm.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.addins.omex.office.net/api/addins/search
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.addins.omex.office.net/appinfo/query
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.addins.omex.office.net/appstate/query
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.addins.store.office.com/addinstemplate
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.addins.store.office.com/app/query
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.cortana.ai
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.diagnostics.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.diagnosticssdf.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.microsoftstream.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.microsoftstream.com/api/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.office.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.officescripts.microsoftusercontent.com/api
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.onedrive.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.powerbi.com/v1.0/myorg/imports
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://api.scheduler.
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://apis.live.net/v5.0/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://apis.mobile.m365.svc.cloud.microsoft
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://arc.msn.com/v4/api/selection
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://augloop.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://augloop.office.com/v2
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://autodiscover-s.outlook.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
Source: Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mo
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cdn.designerapp.osi.office.net/designer-mobile
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cdn.entity.
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cdn.hubblecontent.osi.office.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cdn.int.designerapp.osi.office.net/fonts
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://client-office365-tas.msedge.net/ab
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net/c2r/v1.0/DeltaAdvisory
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/ios
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/mac
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://config.edge.skype.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://config.edge.skype.com/config/v1/Office
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://config.edge.skype.com/config/v2/Office
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://consent.config.office.com/consentcheckin/v1.0/consents
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://consent.config.office.com/consentweb/v1.0/consents
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cortana.ai
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cortana.ai/api
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://cr.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://d.docs.live.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dataservice.o365filtering.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dataservice.o365filtering.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://designerapp.officeapps.live.com/designerapp
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dev.cortana.ai
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://dev0-api.acompli.net/autodetect
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://devnull.onenote.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://directory.services.
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ecs.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ecs.office.com/config/v1/Designer
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ecs.office.com/config/v2/Office
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://edge.skype.com/registrar/prod
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://edge.skype.com/rps
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/v2.1601652342626
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://entitlement.diagnostics.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://entitlement.diagnosticssdf.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://fpastorage.cdn.office.net/%s
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://fpastorage.cdn.office.net/firstpartyapp/addins.xml
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://globaldisco.crm.dynamics.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://graph.ppe.windows.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://graph.ppe.windows.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://graph.windows.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://graph.windows.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/pivots/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ic3.teams.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://incidents.diagnostics.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://incidents.diagnosticssdf.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://inclient.store.office.com/gyro/client
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://inclient.store.office.com/gyro/clientstore
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://invites.office.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://lifecycle.office.com
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015D2000.00000004.00000020.00020000.00000000.sdmp, 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://login.microsoftonline.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://login.microsoftonline.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://login.windows.local
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://login.windows.net/common/oauth2/authorize
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://make.powerautomate.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://management.azure.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://management.azure.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messagebroker.mobile.m365.svc.cloud.microsoft
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.action.office.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.action.office.com/setcampaignaction
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.action.office.com/setuseraction16
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.engagement.office.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.engagement.office.com/campaignmetadataaggregator
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.lifecycle.office.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.lifecycle.office.com/getcustommessage16
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://messaging.office.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://metadata.templates.cdn.office.net/client/log
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://my.microsoftpersonalcontent.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ncus.contentsync.
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ncus.pagecontentsync.
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ods-diagnostics-ppe.trafficmanager.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://officeapps.live.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://officeci.azurewebsites.net/api/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://officepyservice.office.net/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://officepyservice.office.net/service.functionality
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://officesetup.getmicrosoftkey.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://onedrive.live.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://onedrive.live.com/embed?
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://otelrules.azureedge.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://otelrules.svc.static.microsoft
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office365.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office365.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://outlook.office365.com/connectors
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://pages.store.office.com/review/query
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://powerlift-frontdesk.acompli.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://powerlift.acompli.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://pushchannel.1drv.ms
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://res.cdn.office.net
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.39
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://res.cdn.office.net/polymer/models
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://safelinks.protection.outlook.com/api/GetPolicy
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://service.officepy.microsoftusercontent.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://settings.outlook.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://shell.suite.office.com:1443
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://skyapi.live.net/Activity/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://staging.cortana.ai
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://store.office.cn/addinstemplate
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://store.office.de/addinstemplate
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://substrate.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://substrate.office.com/Notes-Internal.ReadWrite
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://substrate.office.com/search/api/v2/init
Source: Document.doc.scr.exe, 00000000.00000003.1641703061.00000000015BD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: Document.doc.scr.exe, 00000000.00000003.1641703061.00000000015BD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefox
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://tasks.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://templatesmetadata.office.net/
Source: Document.doc.scr.exe, 00000000.00000003.1707496513.00000000014F5000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1720133604.00000000014E5000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1637012191.0000000001509000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1636242944.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1635933146.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1638487469.00000000014D3000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1721551758.0000000001503000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1707496513.00000000014D2000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1639163237.00000000014D3000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1729294541.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1642025737.00000000014D4000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1636749870.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1637146733.00000000014D2000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1640099039.00000000014D3000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1694408467.00000000014D2000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1639523659.00000000014D3000.00000004.00000020.00020000.00000000.sdmp, te8ZzuVLn.README.txt376.0.dr, te8ZzuVLn.README.txt560.0.dr, te8ZzuVLn.README.txt126.0.dr, te8ZzuVLn.README.txt252.0.dr String found in binary or memory: https://tox.chat/
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://twitter.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://useraudit.o365auditrealtimeingestion.manage.office.com
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://web.microsoftstream.com/video/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://webshell.suite.office.com
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015D2000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://weibo.com/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://word-edit.officeapps.live.com/we/rrdiscovery.ashx
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://wus2.contentsync.
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://wus2.pagecontentsync.
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.aliexpress.com/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.ca/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.co.uk/
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015CD000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.de/
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.fr/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.avito.ru/
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.baidu.com/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.bbc.co.uk/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ctrip.com/
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ebay.co.uk/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ebay.de/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015D2000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/complete/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ifeng.com/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.iqiyi.com/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.leboncoin.fr/
Source: Document.doc.scr.exe, 00000000.00000003.1647715898.00000000015C9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org
Source: Document.doc.scr.exe, 00000000.00000003.1641703061.00000000015BD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/
Source: Document.doc.scr.exe, 00000000.00000003.1641703061.00000000015BD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/
Source: Document.doc.scr.exe, 00000000.00000003.1641703061.00000000015BD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: Document.doc.scr.exe, 00000000.00000003.1836059334.00000000015D5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/media/css/privacy_protocol.04de168de977.css
Source: Document.doc.scr.exe, 00000000.00000003.1641703061.00000000015BD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon-196x196.2af054fea211.png
Source: Document.doc.scr.exe, 00000000.00000003.1641703061.00000000015BD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon.d25d81d39065.icox
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://www.odwebp.svc.ms
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015D2000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.olx.pl/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.reddit.com/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1647559154.00000000015B4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.wykop.pl/
Source: 8318DF00-3EE6-4832-A389-1858B54C497D.8.dr String found in binary or memory: https://www.yammer.com
Source: Document.doc.scr.exe, 00000000.00000003.1646252838.00000000015D4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/
Source: Document.doc.scr.exe, 00000000.00000003.1647640101.00000000015D2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.zhihu.com/

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\AppData\Local\Packages\Microsoft.People_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Dropped file: !! ALL YOUR FILES ARE ENCRYPTED !!!You can't restore them without our decryptor.Don't try to use any public tools, you could damage the files and lose them forever.To make sure our decryptor works, contact us and decrypt one file for free.Download TOX messenger: https://tox.chat/Add friend in TOX, ID: 36F186C6FDCAAC0CF122E234B5D15F3F42F73568745F251C1306D71EBCA96817770F9B9AC2E6 Jump to dropped file
Source: Yara match File source: Document.doc.scr.exe, type: SAMPLE
Source: Yara match File source: 0.0.Document.doc.scr.exe.a30000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Document.doc.scr.exe.a30000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.2056232285.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000000.1623894535.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Document.doc.scr.exe PID: 3096, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Document.doc.scr.exe PID: 3096, type: MEMORYSTR
Source: C:\Users\user\Desktop\Document.doc.scr.exe Key value created or modified: HKEY_CURRENT_USER\Control Panel\Desktop WallPaper C:\ProgramData\te8ZzuVLn.bmp Jump to behavior
Source: Document.doc.scr.exe, 00000000.00000002.2058318406.00000000015EF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory : All your important files are stolen and encrypted!
Source: Document.doc.scr.exe, 00000000.00000003.2055349240.00000000015EF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory : All your important files are stolen and encrypted!
Source: Document.doc.scr.exe, 00000000.00000002.2058318406.00000000015CF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory : All your important files are stolen and encrypted!
Source: Document.doc.scr.exe, 00000000.00000002.2057684644.00000000014D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory : Your data are stolen and encrypted
Source: C:\Users\user\Desktop\Document.doc.scr.exe File moved: C:\Users\user\Desktop\AIXACVYBSB\XZXHAVGRAG.pdf Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File moved: C:\Users\user\Desktop\DTBZGIOOSO\ONBQCLYSPU.xlsx Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File moved: C:\Users\user\Desktop\ONBQCLYSPU.jpg Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File moved: C:\Users\user\Desktop\DTBZGIOOSO.docx Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File moved: C:\Users\user\Desktop\ONBQCLYSPU\LTKMYBSEYZ.pdf Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_MSOUC_EXE_15.te8ZzuVLn entropy: 7.99552131911 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_SPREADSHEETCOMPARE_EXE_15.te8ZzuVLn entropy: 7.99483790003 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_SETLANG_EXE_15.te8ZzuVLn entropy: 7.99491482644 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_POWERPNT_EXE_15.te8ZzuVLn entropy: 7.9955829252 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_OUTLOOK_EXE_15.te8ZzuVLn entropy: 7.99568591143 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_ONENOTE_EXE_15.te8ZzuVLn entropy: 7.99603843657 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_OcPubMgr_exe_15.te8ZzuVLn entropy: 7.99502501246 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_MSPUB_EXE_15.te8ZzuVLn entropy: 7.99529614045 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_WINWORD_EXE_15.te8ZzuVLn entropy: 7.99467404936 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_WindowsStore_8wekyb3d8bbwe!App.te8ZzuVLn entropy: 7.99462334975 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_WindowsSoundRecorder_8wekyb3d8bbwe!App.te8ZzuVLn entropy: 7.99505427704 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_WindowsCalculator_8wekyb3d8bbwe!App.te8ZzuVLn entropy: 7.99557563931 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_WindowsAlarms_8wekyb3d8bbwe!App.te8ZzuVLn entropy: 7.99519946801 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_SkyDrive_Desktop.te8ZzuVLn entropy: 7.99490332014 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Shell_RunDialog.te8ZzuVLn entropy: 7.99414018066 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_RemoteDesktop.te8ZzuVLn entropy: 7.99626552779 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Photos_8wekyb3d8bbwe!App.te8ZzuVLn entropy: 7.99435731471 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_MediaPlayer32.te8ZzuVLn entropy: 7.99528942565 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer.te8ZzuVLn entropy: 7.9948360602 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_ControlPanel.te8ZzuVLn entropy: 7.99483496125 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Computer.te8ZzuVLn entropy: 7.99459376985 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_AdministrativeTools.te8ZzuVLn entropy: 7.99522699009 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_iscsicpl_exe.te8ZzuVLn entropy: 7.99530097077 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_dfrgui_exe.te8ZzuVLn entropy: 7.99503440461 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_comexp_msc.te8ZzuVLn entropy: 7.99445452261 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_cmd_exe.te8ZzuVLn entropy: 7.99530373447 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_cleanmgr_exe.te8ZzuVLn entropy: 7.99500605878 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe.te8ZzuVLn entropy: 7.99479564388 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\MSEdge.te8ZzuVLn entropy: 7.99568681923 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_psr_exe.te8ZzuVLn entropy: 7.99544209498 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_printmanagement_msc.te8ZzuVLn entropy: 7.99511610551 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_osk_exe.te8ZzuVLn entropy: 7.99479306223 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_odbcad32_exe.te8ZzuVLn entropy: 7.99561915515 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_notepad_exe.te8ZzuVLn entropy: 7.99440033128 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_narrator_exe.te8ZzuVLn entropy: 7.99529737403 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_mspaint_exe.te8ZzuVLn entropy: 7.99406153815 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_msinfo32_exe.te8ZzuVLn entropy: 7.99564020073 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_msconfig_exe.te8ZzuVLn entropy: 7.99537614337 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_MdSched_exe.te8ZzuVLn entropy: 7.9940544795 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_magnify_exe.te8ZzuVLn entropy: 7.99524422202 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{6D809377-6AF0-444B-8957-A3773F02200E}_Adobe_Acrobat DC_Acrobat_Acrobat_exe.te8ZzuVLn entropy: 7.99595582478 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{6D809377-6AF0-444B-8957-A3773F02200E}_7-Zip_7zFM_exe.te8ZzuVLn entropy: 7.99472623324 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{6D809377-6AF0-444B-8957-A3773F02200E}_7-Zip_7-zip_chm.te8ZzuVLn entropy: 7.99532496955 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WindowsPowerShell_v1_0_PowerShell_ISE_exe.te8ZzuVLn entropy: 7.99499750557 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WindowsPowerShell_v1_0_powershell_exe.te8ZzuVLn entropy: 7.99485273538 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WF_msc.te8ZzuVLn entropy: 7.99553977631 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WFS_exe.te8ZzuVLn entropy: 7.99511096321 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_SnippingTool_exe.te8ZzuVLn entropy: 7.99595303203 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_services_msc.te8ZzuVLn entropy: 7.995625098 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_RecoveryDrive_exe.te8ZzuVLn entropy: 7.99498738923 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_quickassist_exe.te8ZzuVLn entropy: 7.99508809139 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_AutoIt_chm.te8ZzuVLn entropy: 7.99474760225 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_AutoItX_AutoItX_chm.te8ZzuVLn entropy: 7.99553678283 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_AutoIt3_x64_exe.te8ZzuVLn entropy: 7.9948645815 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_AutoIt3_exe.te8ZzuVLn entropy: 7.99539301017 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_AutoIt v3 Website_url.te8ZzuVLn entropy: 7.99448134402 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_Aut2Exe_Aut2exe_x64_exe.te8ZzuVLn entropy: 7.99513595122 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_Aut2Exe_Aut2exe_exe.te8ZzuVLn entropy: 7.9952650604 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_Au3Info_x64_exe.te8ZzuVLn entropy: 7.99547671202 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_Au3Info_exe.te8ZzuVLn entropy: 7.99441445843 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{6D809377-6AF0-444B-8957-A3773F02200E}_Windows NT_Accessories_wordpad_exe.te8ZzuVLn entropy: 7.99595595708 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{6D809377-6AF0-444B-8957-A3773F02200E}_Common Files_Microsoft Shared_Ink_mip_exe.te8ZzuVLn entropy: 7.99514388311 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_SciTE_SciTE_exe.te8ZzuVLn entropy: 7.99495937368 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{F38BF404-1D43-42F2-9305-67DE0B28FC23}_regedit_exe.te8ZzuVLn entropy: 7.99529779 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27}_WindowsPowerShell_v1_0_PowerShell_ISE_exe.te8ZzuVLn entropy: 7.99512763541 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27}_WindowsPowerShell_v1_0_powershell_exe.te8ZzuVLn entropy: 7.99580219221 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27}_odbcad32_exe.te8ZzuVLn entropy: 7.99459480002 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_Java_jre-1_8_bin_javacpl_exe.te8ZzuVLn entropy: 7.99562205847 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_Extras.te8ZzuVLn entropy: 7.99499359969 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}_AutoIt3_Examples.te8ZzuVLn entropy: 7.99502106121 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\edb00001.log.te8ZzuVLn entropy: 7.99965396546 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\edb.log.te8ZzuVLn entropy: 7.99965603653 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\edbres00002.jrs.te8ZzuVLn entropy: 7.99961431871 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\edbres00001.jrs.te8ZzuVLn entropy: 7.99970240581 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite.te8ZzuVLn entropy: 7.99658083928 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm.te8ZzuVLn entropy: 7.993896101 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite.te8ZzuVLn entropy: 7.99619749063 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm.te8ZzuVLn entropy: 7.99448176127 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite.te8ZzuVLn entropy: 7.99602479068 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shm.te8ZzuVLn entropy: 7.99394153722 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm.te8ZzuVLn entropy: 7.99403875976 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite.te8ZzuVLn entropy: 7.99603788407 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.te8ZzuVLn entropy: 7.99619231673 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm.te8ZzuVLn entropy: 7.9947411424 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shm.te8ZzuVLn entropy: 7.99402959368 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\7278f154-e8f4-4235-84c5-c5c1c6af0084.te8ZzuVLn entropy: 7.99776019085 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State.te8ZzuVLn entropy: 7.99714026517 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\first_party_sets.db.te8ZzuVLn entropy: 7.99628127331 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2\doomed\11719.te8ZzuVLn entropy: 7.99529174119 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829744.7278f154-e8f4-4235-84c5-c5c1c6af0084.main.jsonlz4.te8ZzuVLn entropy: 7.99129478168 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1.te8ZzuVLn entropy: 7.99932372138 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\ShaderCache\index.te8ZzuVLn entropy: 7.9991939921 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1.te8ZzuVLn entropy: 7.99927706837 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache\data_1.te8ZzuVLn entropy: 7.99929192705 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\GrShaderCache\index.te8ZzuVLn entropy: 7.99924721781 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache\index.te8ZzuVLn entropy: 7.99932793378 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_storei.te8ZzuVLn entropy: 7.99191395392 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user\ActivitiesCache.db-shm.te8ZzuVLn entropy: 7.99427176739 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe\LocalState\ThirdPartyNotice.html.te8ZzuVLn entropy: 7.99825715148 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\CacheStorage\CacheStorage.jfm.te8ZzuVLn entropy: 7.99003960549 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\edbtmp.log.te8ZzuVLn entropy: 7.99962026789 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\LocalState\PhotosAppTracing_startedInBGMode.etl.te8ZzuVLn entropy: 7.99716159754 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\LocalState\MediaDb.v1.sqlite-shm.te8ZzuVLn entropy: 7.99478490317 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\Settings\settings.dat.te8ZzuVLn entropy: 7.99925524526 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl.te8ZzuVLn entropy: 7.99708880988 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat.te8ZzuVLn entropy: 7.99925462471 Jump to dropped file
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst.te8ZzuVLn entropy: 7.99893054314 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\Document.doc.scr.exe entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\AAAAAAAAAAAAAAAAAAAA (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\BBBBBBBBBBBBBBBBBBBB (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\CCCCCCCCCCCCCCCCCCCC (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\DDDDDDDDDDDDDDDDDDDD (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\EEEEEEEEEEEEEEEEEEEE (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\FFFFFFFFFFFFFFFFFFFF (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\GGGGGGGGGGGGGGGGGGGG (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\HHHHHHHHHHHHHHHHHHHH (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\IIIIIIIIIIIIIIIIIIII (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\JJJJJJJJJJJJJJJJJJJJ (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\KKKKKKKKKKKKKKKKKKKK (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\LLLLLLLLLLLLLLLLLLLL (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\MMMMMMMMMMMMMMMMMMMM (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\NNNNNNNNNNNNNNNNNNNN (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\OOOOOOOOOOOOOOOOOOOO (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\PPPPPPPPPPPPPPPPPPPP (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\QQQQQQQQQQQQQQQQQQQQ (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\RRRRRRRRRRRRRRRRRRRR (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\SSSSSSSSSSSSSSSSSSSS (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\TTTTTTTTTTTTTTTTTTTT (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\UUUUUUUUUUUUUUUUUUUU (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\VVVVVVVVVVVVVVVVVVVV (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\WWWWWWWWWWWWWWWWWWWW (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\XXXXXXXXXXXXXXXXXXXX (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\YYYYYYYYYYYYYYYYYYYY (copy) entropy: 7.99720904007 Jump to dropped file
Source: C:\ProgramData\9A51.tmp File created: C:\Users\user\Desktop\ZZZZZZZZZZZZZZZZZZZZ (copy) entropy: 7.99720904007 Jump to dropped file

System Summary

barindex
Source: Document.doc.scr.exe, type: SAMPLE Matched rule: Windows_Ransomware_Lockbit_369e1e94 Author: unknown
Source: 0.0.Document.doc.scr.exe.a30000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Lockbit_369e1e94 Author: unknown
Source: 0.2.Document.doc.scr.exe.a30000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Lockbit_369e1e94 Author: unknown
Source: 00000000.00000002.2056232285.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Lockbit_369e1e94 Author: unknown
Source: 00000000.00000000.1623894535.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Lockbit_369e1e94 Author: unknown
Source: initial sample Static PE information: Filename: Document.doc.scr.exe
Source: Document.doc.scr.exe Static file information: Suspicious name
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A404B4 GetTempFileNameW,CreateFileW,WriteFile,CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,CreateNamedPipeW,ResumeThread,ConnectNamedPipe, 0_2_00A404B4
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A39880 NtClose, 0_2_00A39880
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A36C98 NtQueryInformationToken, 0_2_00A36C98
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A47034 CreateThread,CreateThread,CreateThread,CreateThread,NtTerminateThread,CreateThread,CreateThread, 0_2_00A47034
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3DC60 NtTerminateProcess, 0_2_00A3DC60
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3B470 NtProtectVirtualMemory, 0_2_00A3B470
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3B444 NtSetInformationThread, 0_2_00A3B444
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3E45C SetFileAttributesW,CreateFileW,SetFilePointerEx,ReadFile,NtClose, 0_2_00A3E45C
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3E1E8 CreateThread,NtClose, 0_2_00A3E1E8
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A36668 CreateFileW,NtAllocateVirtualMemory,WriteFile,SetFilePointerEx,NtFreeVirtualMemory,NtClose,DeleteFileW, 0_2_00A36668
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3B674 NtQueryInformationToken, 0_2_00A3B674
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3DE78 SetThreadPriority,ReadFile,WriteFile,WriteFile,NtClose, 0_2_00A3DE78
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A37E58 NtQuerySystemInformation,Sleep, 0_2_00A37E58
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3C3F8 CreateFileW,WriteFile,RegCreateKeyExW,RegSetValueExW,RegCreateKeyExW,RegSetValueExW,SHChangeNotify,NtClose, 0_2_00A3C3F8
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3B3C0 NtSetInformationThread,NtClose, 0_2_00A3B3C0
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A397D8 NtQuerySystemInformation, 0_2_00A397D8
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3B734 NtSetInformationProcess,NtSetInformationProcess,NtSetInformationProcess, 0_2_00A3B734
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A38F68 RtlAdjustPrivilege,NtSetInformationThread, 0_2_00A38F68
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3982A NtQuerySystemInformation, 0_2_00A3982A
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A39811 NtQuerySystemInformation, 0_2_00A39811
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A37EA3 NtQuerySystemInformation,Sleep, 0_2_00A37EA3
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A37E8A NtQuerySystemInformation,Sleep, 0_2_00A37E8A
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A38F66 RtlAdjustPrivilege,NtSetInformationThread, 0_2_00A38F66
Source: C:\ProgramData\9A51.tmp Code function: 9_2_00402760 CreateFileW,ReadFile,NtClose, 9_2_00402760
Source: C:\ProgramData\9A51.tmp Code function: 9_2_0040286C NtSetInformationProcess,NtSetInformationProcess,NtSetInformationProcess, 9_2_0040286C
Source: C:\ProgramData\9A51.tmp Code function: 9_2_00402F18 CreateFileW,NtAllocateVirtualMemory,WriteFile,SetFilePointerEx,SetFilePointerEx,NtFreeVirtualMemory,NtClose,DeleteFileW, 9_2_00402F18
Source: C:\ProgramData\9A51.tmp Code function: 9_2_00401DC2 NtProtectVirtualMemory, 9_2_00401DC2
Source: C:\ProgramData\9A51.tmp Code function: 9_2_00401D94 NtSetInformationThread, 9_2_00401D94
Source: C:\ProgramData\9A51.tmp Code function: 9_2_004016B4 NtAllocateVirtualMemory,NtAllocateVirtualMemory, 9_2_004016B4
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3A68C: GetVolumeNameForVolumeMountPointW,FindFirstVolumeW,GetVolumePathNamesForVolumeNameW,GetDriveTypeW,CreateFileW,DeviceIoControl, 0_2_00A3A68C
Source: C:\Windows\splwow64.exe File created: C:\Windows\system32\spool\PRINTERS\00002.SPL
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A320AC 0_2_00A320AC
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A380B8 0_2_00A380B8
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A34D03 0_2_00A34D03
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A34D08 0_2_00A34D08
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A35218 0_2_00A35218
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process token adjusted: Security
Source: Document.doc.scr.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Document.doc.scr.exe, type: SAMPLE Matched rule: Windows_Ransomware_Lockbit_369e1e94 reference_sample = d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee, os = windows, severity = x86, creation_date = 2022-07-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = 9cf4c112c0ee708ae64052926681e8351f1ccefeb558c41e875dbd9e4bdcb5f2, id = 369e1e94-3fbb-4828-bb78-89d26e008105, last_modified = 2022-07-18
Source: 0.0.Document.doc.scr.exe.a30000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Lockbit_369e1e94 reference_sample = d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee, os = windows, severity = x86, creation_date = 2022-07-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = 9cf4c112c0ee708ae64052926681e8351f1ccefeb558c41e875dbd9e4bdcb5f2, id = 369e1e94-3fbb-4828-bb78-89d26e008105, last_modified = 2022-07-18
Source: 0.2.Document.doc.scr.exe.a30000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Lockbit_369e1e94 reference_sample = d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee, os = windows, severity = x86, creation_date = 2022-07-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = 9cf4c112c0ee708ae64052926681e8351f1ccefeb558c41e875dbd9e4bdcb5f2, id = 369e1e94-3fbb-4828-bb78-89d26e008105, last_modified = 2022-07-18
Source: 00000000.00000002.2056232285.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Lockbit_369e1e94 reference_sample = d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee, os = windows, severity = x86, creation_date = 2022-07-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = 9cf4c112c0ee708ae64052926681e8351f1ccefeb558c41e875dbd9e4bdcb5f2, id = 369e1e94-3fbb-4828-bb78-89d26e008105, last_modified = 2022-07-18
Source: 00000000.00000000.1623894535.0000000000A31000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Lockbit_369e1e94 reference_sample = d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee, os = windows, severity = x86, creation_date = 2022-07-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = 9cf4c112c0ee708ae64052926681e8351f1ccefeb558c41e875dbd9e4bdcb5f2, id = 369e1e94-3fbb-4828-bb78-89d26e008105, last_modified = 2022-07-18
Source: classification engine Classification label: mal100.rans.phis.spyw.evad.winEXE@9/1664@0/0
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7956:120:WilError_03
Source: C:\Users\user\Desktop\Document.doc.scr.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\2d87d2149e7f73dd7b6b84daebbb7b1b
Source: C:\ProgramData\9A51.tmp Mutant created: \Sessions\1\BaseNamedObjects\Global\{649F4E29-16CB-DD42-8922-9FFF0592856B}
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Document.doc.scr.exe Virustotal: Detection: 78%
Source: unknown Process created: C:\Users\user\Desktop\Document.doc.scr.exe "C:\Users\user\Desktop\Document.doc.scr.exe"
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE /insertdoc "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\{8D18B0B1-01EC-46D0-883D-8DEA42AA849B}.xps" 133584887691130000
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process created: C:\ProgramData\9A51.tmp "C:\ProgramData\9A51.tmp"
Source: C:\ProgramData\9A51.tmp Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\9A51.tmp >> NUL
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process created: C:\ProgramData\9A51.tmp "C:\ProgramData\9A51.tmp" Jump to behavior
Source: C:\ProgramData\9A51.tmp Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\9A51.tmp >> NUL
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: activeds.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: adsldpc.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: gpedit.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: dssec.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: dsuiext.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: framedynos.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: dsrole.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: ntdsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: authz.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: adsldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: mscms.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: coloradapterclient.dll Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\ProgramData\9A51.tmp Section loaded: apphelp.dll
Source: C:\ProgramData\9A51.tmp Section loaded: rstrtmgr.dll
Source: C:\ProgramData\9A51.tmp Section loaded: ncrypt.dll
Source: C:\ProgramData\9A51.tmp Section loaded: ntasn1.dll
Source: C:\ProgramData\9A51.tmp Section loaded: windows.storage.dll
Source: C:\ProgramData\9A51.tmp Section loaded: wldp.dll
Source: C:\ProgramData\9A51.tmp Section loaded: kernel.appcore.dll
Source: C:\ProgramData\9A51.tmp Section loaded: uxtheme.dll
Source: C:\ProgramData\9A51.tmp Section loaded: propsys.dll
Source: C:\ProgramData\9A51.tmp Section loaded: profapi.dll
Source: C:\ProgramData\9A51.tmp Section loaded: edputil.dll
Source: C:\ProgramData\9A51.tmp Section loaded: urlmon.dll
Source: C:\ProgramData\9A51.tmp Section loaded: iertutil.dll
Source: C:\ProgramData\9A51.tmp Section loaded: srvcli.dll
Source: C:\ProgramData\9A51.tmp Section loaded: netutils.dll
Source: C:\ProgramData\9A51.tmp Section loaded: windows.staterepositoryps.dll
Source: C:\ProgramData\9A51.tmp Section loaded: sspicli.dll
Source: C:\ProgramData\9A51.tmp Section loaded: wintypes.dll
Source: C:\ProgramData\9A51.tmp Section loaded: appresolver.dll
Source: C:\ProgramData\9A51.tmp Section loaded: bcp47langs.dll
Source: C:\ProgramData\9A51.tmp Section loaded: slc.dll
Source: C:\ProgramData\9A51.tmp Section loaded: userenv.dll
Source: C:\ProgramData\9A51.tmp Section loaded: sppc.dll
Source: C:\ProgramData\9A51.tmp Section loaded: onecorecommonproxystub.dll
Source: C:\ProgramData\9A51.tmp Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\Desktop\Document.doc.scr.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\$Recycle.Bin\S-1-5-21-2246122658-3693405117-2476756634-1000\desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: Document.doc.scr.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Document.doc.scr.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\te8ZzuVLn.README.txt[N0h source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1679051238.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error.te8ZzuVLn.txt+I source: Document.doc.scr.exe, 00000000.00000003.1691524981.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1692610971.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1679051238.0000000001504000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1690809071.0000000001503000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1689479201.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: Document.doc.scr.exe, 00000000.00000003.1694408467.00000000014F5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorI source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001537000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\te8ZzuVLn.README.txt source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: Document.doc.scr.exe, 00000000.00000003.1694408467.00000000014F5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb:UZh source: Document.doc.scr.exe, 00000000.00000003.1673702635.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\te8ZzuVLn.README.txt source: Document.doc.scr.exe, 00000000.00000003.1673702635.000000000151F000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1679051238.000000000151F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.erroru source: Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \Device\HarddiskVolume3\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ownload.errornHI i source: Document.doc.scr.exe, 00000000.00000003.1679051238.0000000001504000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error- source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Document.doc.scr.exe, 00000000.00000003.1677146732.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1675241594.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1676629695.00000000015F1000.00000004.00000020.00020000.00000000.sdmp, Document.doc.scr.exe, 00000000.00000003.1674757218.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
Source: Document.doc.scr.exe Static PE information: real checksum: 0x25e98 should be: 0x3b6d6
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A361ED push esp; retf 0_2_00A361F6
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A335D3 push 0000006Ah; retf 0_2_00A33644
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A335D5 push 0000006Ah; retf 0_2_00A33644
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3356B push 0000006Ah; retf 0_2_00A33644
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Videos\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Searches\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Saved Games\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Recent\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Pictures\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Pictures\Saved Pictures\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Pictures\Camera Roll\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\OneDrive\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Music\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Links\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Favorites\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Favorites\Links\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Downloads\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\ZBEDCJPBEY\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\WKXEWIOTXI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\SQRKHNBNYN\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\ONBQCLYSPU\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\KZWFNRXYKI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\KATAXZVCPS\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\HTAGVDFUIE\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\DTBZGIOOSO\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Documents\AIXACVYBSB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\ZBEDCJPBEY\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\WKXEWIOTXI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\SQRKHNBNYN\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\ONBQCLYSPU\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\KZWFNRXYKI\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\KATAXZVCPS\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\HTAGVDFUIE\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\DTBZGIOOSO\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Desktop\AIXACVYBSB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\Contacts\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Skype\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Skype\RootTools\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\to-be-removed\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\temporary\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\security_state\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\minidumps\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\tmp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\db\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\bookmarkbackups\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Pending Pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Crash Reports\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Crash Reports\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Extensions\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\f2eb6c79-671d-4de2-b7be-3b2eea7abc47\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\6d9d9777-7ded-4768-8191-9a707d72b009\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\61f56613-c62c-4b17-84dd-62b60d5776aa\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\com.adobe.dunamis\56079431-ea46-4833-94f9-1ff5658cdb1c\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Sonar\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Sonar\SonarCC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\RTTransfer\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\LogTransport2CC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\LogTransport2\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Linguistics\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Headlights\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Flash Player\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Flash Player\NativeCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\CRLogs\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\CRLogs\crashlogs\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\Preflight Acrobat Continuous\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Forms\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Collab\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Linguistics\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cookie\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\VideoDecodeStats\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\metadata\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\d1702bdf-c0c8-42c3-b6d9-e52fd0a57b16\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\assets\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\DesktopNotification\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\DesktopNotification\NotificationsDB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\VirtualStore\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\mozilla-temp-files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Low\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Diagnostics\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\DC\SearchEmbdIndex\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrocef_low\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\Adobe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\Adobe\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\Adobe\Acrobat\DC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\SolidDocuments\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\SolidDocuments\Acrobat\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\SettingsContainer\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\Microsoft.WindowsAlarms\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\Licenses\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Publishers\8wekyb3d8bbwe\Fonts\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\PlaceholderTileLogoFolder\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\PeerDistRepub\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.PrintDialog_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Windows.CBSPreview_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.YourPhone_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\LocalState\DiagOutputDir\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameOverlay_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.XboxApp_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Xbox.TCUI_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsMaps_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\AC\BackgroundTransferApi\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCamera_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.WindowsAlarms_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\Flighting\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{97b27011-f8cc-4ac9-9531-d6ee8ce92324}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{76cc83ea-ae96-47fc-9329-459e5ad2d67b}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{0f31ce30-ed3d-4588-b294-208da23711e6}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{bf219d98-b737-4343-a3eb-cfe34ee6bd79}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{2c33d893-bc92-487f-aede-304ebfc79509}\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\CacheStorage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\RoamingState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\LocalState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\LocalCache\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\AppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\AC\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Photos_8wekyb3d8bbwe\AC\Temp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\TempState\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\SystemAppData\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\Settings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\RoamingState\te8ZzuVLn.README.txt Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\ProgramData\9A51.tmp Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\9A51.tmp >> NUL
Source: C:\ProgramData\9A51.tmp Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\9A51.tmp >> NUL
Source: Possible double extension: doc.scr Static PE information: Document.doc.scr.exe
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A391C8 RegCreateKeyExW,RegEnumKeyW,RegCreateKeyExW,RegSetValueExW,RegSetValueExW,OpenEventLogW,ClearEventLogW,CloseEventLog,RegCreateKeyExW,RegEnumKeyW,OpenEventLogW,ClearEventLogW, 0_2_00A391C8
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
Source: C:\ProgramData\9A51.tmp Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A310BC 0_2_00A310BC
Source: C:\ProgramData\9A51.tmp Code function: 9_2_00401E28 9_2_00401E28
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A310BC rdtsc 0_2_00A310BC
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A374BC FindFirstFileExW,FindNextFileW, 0_2_00A374BC
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3A094 FindFirstFileExW,FindClose, 0_2_00A3A094
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A35C24 FindFirstFileW,FindClose,FindNextFileW,FindClose, 0_2_00A35C24
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A37590 FindFirstFileExW,FindClose, 0_2_00A37590
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3766C FindFirstFileExW,GetFileAttributesW,FindNextFileW, 0_2_00A3766C
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A3F308 GetFileAttributesW,SetThreadPriority,FindFirstFileExW,FindNextFileW,FindClose, 0_2_00A3F308
Source: C:\ProgramData\9A51.tmp Code function: 9_2_0040227C FindFirstFileExW, 9_2_0040227C
Source: C:\ProgramData\9A51.tmp Code function: 9_2_0040152C FindFirstFileExW,FindClose,FindNextFileW,FindClose, 9_2_0040152C
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A37468 GetLogicalDriveStringsW,GetDriveTypeW, 0_2_00A37468
Source: C:\Windows\splwow64.exe Thread delayed: delay time: 120000
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\Diagnostics\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat\DC\ Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\ Jump to behavior
Source: 9A51.tmp, 00000009.00000002.2063331074.0000000000514000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: Document.doc.scr.exe, 00000000.00000003.1670449222.0000000001613000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware, Inc.
Source: Document.doc.scr.exe, 00000000.00000003.1670449222.0000000001613000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware20,1
Source: Document.doc.scr.exe, 00000000.00000003.1669263983.0000000001627000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 10/04/2023 11:53:18.526OFFICECL (0x1db0)0x1dd4Telemetry EventbiyhqMediumSendEvent {"EventName": "Office.System.SystemHealthMetadataDeviceConsolidated", "Flags": 33777031581908737, "InternalSequenceNumber": 17, "Time": "2023-10-04T10:52:48Z", "Rule": "120600.4", "AriaTenantToken": "cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521", "Contract": "Office.Legacy.Metadata", "Data.ProcTypeText": "x64", "Data.ProcessorCount": 2, "Data.NumProcShareSingleCore": 1, "Data.NumProcShareSingleCache": 1, "Data.NumProcPhysCores": 2, "Data.ProcSpeedMHz": 2000, "Data.IsLaptop": false, "Data.IsTablet": false, "Data.RamMB": 4096, "Data.PowerPlatformRole": 1, "Data.SysVolSizeMB": 50000, "Data.DeviceManufacturer": "VMWare, Inc.", "Data.DeviceModel": "VMware20,1", "Data.DigitizerInfo": 0, "Data.SusClientId": "097C77FB-5D5D-4868-860B-09F4E5B50A53", "Data.WindowsSqmMachineId": "92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A", "Data.ComputerSystemProductUuidHash": "rC2kkStHpWGLvfAgmQZRz4w5ixE=", "Data.DeviceProcessorModel": "Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz", "Data.HasSpectreFix": true, "Data.BootDiskType": "SSD"}
Source: Document.doc.scr.exe, 00000000.00000003.1894204579.00000000014F5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllNE
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process information queried: ProcessInformation

Anti Debugging

barindex
Source: C:\Users\user\Desktop\Document.doc.scr.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\ProgramData\9A51.tmp Thread information set: HideFromDebugger
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A310BC rdtsc 0_2_00A310BC
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A35A20 LdrLoadDll, 0_2_00A35A20
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process token adjusted: Debug

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Document.doc.scr.exe Memory written: C:\ProgramData\9A51.tmp base: 401000 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe Process created: C:\ProgramData\9A51.tmp "C:\ProgramData\9A51.tmp" Jump to behavior
Source: C:\ProgramData\9A51.tmp Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\9A51.tmp >> NUL
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A310BC cpuid 0_2_00A310BC
Source: C:\ProgramData\9A51.tmp Code function: EntryPoint,ExitProcess,GetModuleHandleW,GetCommandLineW,GetModuleHandleA,GetCommandLineW,GetLocaleInfoW,GetLastError,FreeLibrary,FreeLibrary,GetProcAddress,CreateWindowExW,DefWindowProcW,GetWindowTextW,LoadMenuW,LoadMenuW,DefWindowProcW,SetTextColor,GetTextCharset,TextOutW,SetTextColor,GetTextColor,CreateFontW,GetTextColor,CreateDIBitmap,SelectObject,GetTextColor,CreateFontW, 9_2_00403983
Source: C:\Users\user\Desktop\Document.doc.scr.exe Code function: 0_2_00A404B4 GetTempFileNameW,CreateFileW,WriteFile,CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,CreateNamedPipeW,ResumeThread,ConnectNamedPipe, 0_2_00A404B4

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\to-be-removed\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\temporary\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.files\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\security_state\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\minidumps\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\tmp\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\db\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\events\te8ZzuVLn.README.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\bookmarkbackups\te8ZzuVLn.README.txt Jump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\handlers.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\12f997af-c065-4562-b9f6-11000bb95c9b.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\78267ebf-1fb3-4b11-82e9-903e54a2a54e.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829702.cde8135c-88c3-4c34-8670-7ef017742548.new-profile.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\session-state.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\background-update Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834620.c7889da7-33f0-4599-8452-58d47c58437b.main.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\05d02ac8-b2f1-4670-8541-db8ec2bbf427.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829744.7278f154-e8f4-4235-84c5-c5c1c6af0084.main.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\1435a377-bbaf-4c9c-8706-0811a779fa3f Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\.metadata-v2 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\808127e8-e7ed-4078-b3f3-7f09061a011f Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\times.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857860.a73949a2-5a70-4025-8008-88156c16bb4a.event.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\AlternateServices.txt.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\previous.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857860.81ddb4cc-1d49-45f2-961f-e24ea6db2be5.health.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857869.95af30ae-acac-4802-b983-233d7fd3cf34.main.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\upgrade.jsonlz4-20230927232528.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\Telemetry.FailedProfileLocks.txt.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\Telemetry.FailedProfileLocks.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829746.67aa4432-87f8-463e-b422-f6679add9971.first-shutdown.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\12f997af-c065-4562-b9f6-11000bb95c9b Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\1d5599c8-3f43-42cc-8163-9a43c60a06d1 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834580.6fc53411-ad83-4cf6-a5f6-905f0f3f52e8.health.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\compatibility.ini.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\SiteSecurityServiceState.txt.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\7d12ac42-15c3-4db9-abfe-259bc8d249ac.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857860.81ddb4cc-1d49-45f2-961f-e24ea6db2be5.health.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\compatibility.ini Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\background-update.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\pkcs11.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\times.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\78267ebf-1fb3-4b11-82e9-903e54a2a54e Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\containers.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\6fc53411-ad83-4cf6-a5f6-905f0f3f52e8.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\a7174184-f177-48c4-876a-8a51c2ed8fbc.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\.metadata-v2.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\times.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\6fc53411-ad83-4cf6-a5f6-905f0f3f52e8 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829746.67aa4432-87f8-463e-b422-f6679add9971.first-shutdown.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\pkcs11.txt.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\7278f154-e8f4-4235-84c5-c5c1c6af0084 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\45e26519-596d-41a5-b290-e547b44111fd Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834580.6fc53411-ad83-4cf6-a5f6-905f0f3f52e8.health.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\times.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\1d5599c8-3f43-42cc-8163-9a43c60a06d1.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\a5d6ec76-765c-4778-afd2-1e05a1554d8e Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\handlers.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834620.c7889da7-33f0-4599-8452-58d47c58437b.main.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\events.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\7d12ac42-15c3-4db9-abfe-259bc8d249ac Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\15f01145-7764-450b-9ad5-323693350a9c.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\shield-preference-experiments.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\15f01145-7764-450b-9ad5-323693350a9c Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834608.65054280-9d54-477d-a3ea-afcb1f88e001.health.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857833.45e26519-596d-41a5-b290-e547b44111fd.health.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\previous.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extension-preferences.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857833.45e26519-596d-41a5-b290-e547b44111fd.health.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829737.9f7a5e7a-2be0-4ff7-b132-b1f6e59a8e58.event.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\state.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\808127e8-e7ed-4078-b3f3-7f09061a011f.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857860.a73949a2-5a70-4025-8008-88156c16bb4a.event.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\search.json.mozlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\a7174184-f177-48c4-876a-8a51c2ed8fbc Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829744.7278f154-e8f4-4235-84c5-c5c1c6af0084.main.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829737.9f7a5e7a-2be0-4ff7-b132-b1f6e59a8e58.event.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\a5d6ec76-765c-4778-afd2-1e05a1554d8e.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834608.65054280-9d54-477d-a3ea-afcb1f88e001.health.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\containers.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\events Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834606.011115ff-9301-40fc-805e-ba07b7fdfce4.event.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\shield-preference-experiments.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\session-state.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\05d02ac8-b2f1-4670-8541-db8ec2bbf427 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\277ffbb3-8e94-4f3f-acac-7a401d130160.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333857869.95af30ae-acac-4802-b983-233d7fd3cf34.main.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\1435a377-bbaf-4c9c-8706-0811a779fa3f.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extension-preferences.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\AlternateServices.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333829702.cde8135c-88c3-4c34-8670-7ef017742548.new-profile.jsonlz4.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\3a40aaf9-3f8b-43a2-85e8-88e3ffc7666f Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\SiteSecurityServiceState.txt Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\upgrade.jsonlz4-20230927232528 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\search.json.mozlz4 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\277ffbb3-8e94-4f3f-acac-7a401d130160 Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\7278f154-e8f4-4235-84c5-c5c1c6af0084.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\3a40aaf9-3f8b-43a2-85e8-88e3ffc7666f.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\state.json.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\45e26519-596d-41a5-b290-e547b44111fd.te8ZzuVLn Jump to behavior
Source: C:\Users\user\Desktop\Document.doc.scr.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\1696333834606.011115ff-9301-40fc-805e-ba07b7fdfce4.event.jsonlz4 Jump to behavior
No contacted IP infos