Source: gunzipped.exe, 00000007.00000002.1965144690.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, gunzipped.exe, 00000007.00000002.1966713417.0000000000C28000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://45.77.223.48/~blog/?ajax=a |
Source: gunzipped.exe, 00000007.00000002.1967011464.0000000000C8C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://45.77.223.48/~blog/index.php?rest_route=/ |
Source: gunzipped.exe, mPvIOxEZXJsdYp.exe.0.dr |
String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: gunzipped.exe, 00000000.00000002.1739814239.000000000798C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningC |
Source: gunzipped.exe, mPvIOxEZXJsdYp.exe.0.dr |
String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: gunzipped.exe, 00000000.00000002.1739814239.000000000798C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crt.cRa |
Source: gunzipped.exe, mPvIOxEZXJsdYp.exe.0.dr |
String found in binary or memory: http://ocsp.comodoca.com0 |
Source: gunzipped.exe, 00000000.00000002.1734483574.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, mPvIOxEZXJsdYp.exe, 00000008.00000002.1763912656.0000000002F66000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.carterandcone.coml |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers? |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designersG |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fonts.com |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.goodfont.co.kr |
Source: mPvIOxEZXJsdYp.exe, mPvIOxEZXJsdYp.exe, 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://www.ibsensoftware.com/ |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sajatypeworks.com |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sakkal.com |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sandoll.co.kr |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.tiro.com |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.typography.netD |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.urwpp.deDPlease |
Source: gunzipped.exe, 00000000.00000002.1738130730.0000000006EB2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.zhongyicts.com.cn |
Source: gunzipped.exe, 00000007.00000002.1967011464.0000000000C8C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://api.w.org/ |
Source: gunzipped.exe, mPvIOxEZXJsdYp.exe.0.dr |
String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: Loki Payload Author: kevoreilly |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000002.1735179615.00000000047D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 00000000.00000002.1735179615.00000000047D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 00000000.00000002.1735179615.00000000047D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 00000008.00000002.1765632980.0000000004A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 00000008.00000002.1765632980.0000000004A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 00000008.00000002.1765632980.0000000004A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000002.1735179615.00000000047F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 00000000.00000002.1735179615.00000000047F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 00000000.00000002.1735179615.00000000047F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Loki Payload Author: kevoreilly |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 00000008.00000002.1765632980.0000000004A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 00000008.00000002.1765632980.0000000004A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 00000008.00000002.1765632980.0000000004A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 00000008.00000002.1763912656.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 00000008.00000002.1763912656.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 00000008.00000002.1763912656.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000002.1734483574.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: 00000000.00000002.1734483574.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown |
Source: 00000000.00000002.1734483574.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group |
Source: Process Memory Space: gunzipped.exe PID: 6640, type: MEMORYSTR |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: Process Memory Space: mPvIOxEZXJsdYp.exe PID: 7368, type: MEMORYSTR |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: Process Memory Space: mPvIOxEZXJsdYp.exe PID: 7608, type: MEMORYSTR |
Matched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_00FAD2A4 |
0_2_00FAD2A4 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_077223E0 |
0_2_077223E0 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_077220C8 |
0_2_077220C8 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07721688 |
0_2_07721688 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07721450 |
0_2_07721450 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07721441 |
0_2_07721441 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_077223D1 |
0_2_077223D1 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07720228 |
0_2_07720228 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07720219 |
0_2_07720219 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_0772D1B8 |
0_2_0772D1B8 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_0772D1A9 |
0_2_0772D1A9 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07723070 |
0_2_07723070 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07723060 |
0_2_07723060 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_077210E0 |
0_2_077210E0 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_077210D1 |
0_2_077210D1 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_077220B8 |
0_2_077220B8 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07725F70 |
0_2_07725F70 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07725F61 |
0_2_07725F61 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_0772EDF0 |
0_2_0772EDF0 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_0772CD80 |
0_2_0772CD80 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_0772C942 |
0_2_0772C942 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_0772C948 |
0_2_0772C948 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07724910 |
0_2_07724910 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_07724901 |
0_2_07724901 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Code function: 0_2_0772E9B8 |
0_2_0772E9B8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_02B9D2A4 |
8_2_02B9D2A4 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0585D320 |
8_2_0585D320 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0585EF80 |
8_2_0585EF80 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_05852757 |
8_2_05852757 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_05852768 |
8_2_05852768 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_05850007 |
8_2_05850007 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_05850040 |
8_2_05850040 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_058523B0 |
8_2_058523B0 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0585D310 |
8_2_0585D310 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0585EF70 |
8_2_0585EF70 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_05852E80 |
8_2_05852E80 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_072223E0 |
8_2_072223E0 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_072220C8 |
8_2_072220C8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722E748 |
8_2_0722E748 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07221688 |
8_2_07221688 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07221441 |
8_2_07221441 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07221450 |
8_2_07221450 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_072223D1 |
8_2_072223D1 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07220228 |
8_2_07220228 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07220219 |
8_2_07220219 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722D1A8 |
8_2_0722D1A8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722D1B8 |
8_2_0722D1B8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07223060 |
8_2_07223060 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07223070 |
8_2_07223070 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_072220B8 |
8_2_072220B8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_072210E0 |
8_2_072210E0 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_072210D1 |
8_2_072210D1 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07225F6F |
8_2_07225F6F |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07225F70 |
8_2_07225F70 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722CD80 |
8_2_0722CD80 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722EDF0 |
8_2_0722EDF0 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722490F |
8_2_0722490F |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07224910 |
8_2_07224910 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722C944 |
8_2_0722C944 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722C948 |
8_2_0722C948 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0722E9B8 |
8_2_0722E9B8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0742F580 |
8_2_0742F580 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0742EB18 |
8_2_0742EB18 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_074253B8 |
8_2_074253B8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0742E290 |
8_2_0742E290 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_074249F8 |
8_2_074249F8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0742EFE0 |
8_2_0742EFE0 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_0742D780 |
8_2_0742D780 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07426CA8 |
8_2_07426CA8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07426CB8 |
8_2_07426CB8 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_074253A7 |
8_2_074253A7 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07425110 |
8_2_07425110 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_07425120 |
8_2_07425120 |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 8_2_074249EB |
8_2_074249EB |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 13_2_0040549C |
13_2_0040549C |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Code function: 13_2_004029D4 |
13_2_004029D4 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a2c7f8.6.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 0.2.gunzipped.exe.47d96c8.9.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 0.2.gunzipped.exe.47d96c8.9.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 0.2.gunzipped.exe.47f36e8.8.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 8.2.mPvIOxEZXJsdYp.exe.4a46818.5.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 13.2.mPvIOxEZXJsdYp.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 0.2.gunzipped.exe.47f36e8.8.unpack, type: UNPACKEDPE |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000002.1735179615.00000000047D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 00000000.00000002.1735179615.00000000047D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 00000000.00000002.1735179615.00000000047D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 00000008.00000002.1765632980.0000000004A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 00000008.00000002.1765632980.0000000004A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 00000008.00000002.1765632980.0000000004A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000002.1735179615.00000000047F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 00000000.00000002.1735179615.00000000047F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 00000000.00000002.1735179615.00000000047F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 0000000D.00000002.1741382852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 00000008.00000002.1765632980.0000000004A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 00000008.00000002.1765632980.0000000004A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 00000008.00000002.1765632980.0000000004A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 00000008.00000002.1763912656.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 00000008.00000002.1763912656.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 00000008.00000002.1763912656.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000002.1734483574.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: 00000000.00000002.1734483574.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23 |
Source: 00000000.00000002.1734483574.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research |
Source: Process Memory Space: gunzipped.exe PID: 6640, type: MEMORYSTR |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: Process Memory Space: mPvIOxEZXJsdYp.exe PID: 7368, type: MEMORYSTR |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: Process Memory Space: mPvIOxEZXJsdYp.exe PID: 7608, type: MEMORYSTR |
Matched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: microsoft.management.infrastructure.native.unmanaged.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wmidcom.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: taskschd.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: vaultcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: samcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: samlib.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: fastprox.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: ncobjapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mpclient.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: wmitomi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: mi.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: miutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: taskschd.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, bqm8VYzAoI4TqX0HlQ.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pggOlnLVtw', 'GCnOLISRm7', 'L3xO2ORmMg', 'NdMOeHmSi8', 'UXqOEnElsb', 'FyqOOBnNQN', 'TS0OYZ4NOf' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, TBf20b07Pm0yAXHpaX.cs |
High entropy of concatenated method names: 'UUvW6LdP1', 'mHr8x0cEH', 'UXPhVKxn4', 'fvlg3IZAy', 'irrUNUbB1', 'eCldUGynG', 'mf61ydnNeuI55gRfRG', 'suMk0wr38nxm7KVlO1', 'STkEEmrac', 'jyQYhdkrN' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, lfMEOk1XbiFlh7aNLt.cs |
High entropy of concatenated method names: 'KF9Pon0STn', 't69PA64Vkc', 'aSHPmrCiA0', 'a1rPqTDHiJ', 'cinPLnmYq6', 'gk2P2qw6Ic', 'oKIMS2CuiiVo5VmgFu', 'G7NL27uA9aAZJn0qPy', 'slxPPNKHnk', 'QahPtBKE1q' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, SrGMToCY8IuKIaqFwN.cs |
High entropy of concatenated method names: 'ToString', 'DOf2j9F6fx', 'X2y2sggvVD', 'JhU25pYMP9', 'Fud2VKsqD0', 'f862NnD3pQ', 'nuX2H9AAu5', 'k362boR364', 'IZe2uX6Ge8', 'P6W244IAAK' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, WpAqRTfsZwXL6EEweX.cs |
High entropy of concatenated method names: 'ERKemRshCS', 'FcXeqg58w5', 'ToString', 'aLVervj2Qw', 'uR7eJMHngJ', 'WExe9Y06AW', 'rCAeXaX3dv', 'DoMex0fnB5', 'v9LeofAvoH', 'IYweAq9vnV' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, dAALak3ZAtSNj79518.cs |
High entropy of concatenated method names: 'PxgErR5Eob', 'YTmEJ4wGV5', 'q6sE9ptCBg', 'jb7EXsIRF7', 'FOeExvBS6y', 'GuwEotsLP6', 'cFmEAGCPS8', 'qN5EyQs0IL', 'cJEEmaIHxx', 'uroEqY8JmE' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, tG9fxIUSHrCiA0I1rT.cs |
High entropy of concatenated method names: 'ofF98Ey09K', 'FTt9h9yJLm', 'lsO9TyQff4', 'vot9UP0Nmh', 'bXS9L8KIjo', 'ovZ928jMJW', 'PGK9eQk9lm', 'WHO9EJ2ZIx', 'KBZ9OQQmtL', 'Bqe9Y9m24b' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, XlBHpd48ALb7kEfdTk.cs |
High entropy of concatenated method names: 'xpkop4PCCC', 'QZLoSTJXZX', 'l4voW5t6IY', 'AAAo8RDtSc', 'uq8onSHZZx', 'ba1oh5dchR', 'RIIogN0QN9', 'GHxoTo0dn1', 'rddoUsYdvN', 'w5uodmuqe2' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, tq6Jk2cqw6IcgF03NR.cs |
High entropy of concatenated method names: 'bN6x736MGg', 'GqmxJA28Wi', 'K8txXSPrny', 'wJfxopXXDw', 'ldDxA1lLU3', 'skOXk0pKUK', 'UR9XZmAjCI', 'M1OXKTnnhi', 'Sh1X3PbFbO', 'eidXa8rPDH' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, eHdT6rwUbADaxa7kJW.cs |
High entropy of concatenated method names: 'ojiOPBg4o0', 'qnpOtcwCUa', 'h2gO1OuHN7', 'MtxOr3Z98C', 'OtsOJDHiDk', 'HELOXIRDWG', 'avHOxqsmeT', 'L9gEKVBPIv', 'Dm1E3Tdy1f', 'OJfEaXrf3y' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, B8eLaGJcwW1e49fRCP.cs |
High entropy of concatenated method names: 'Dispose', 'cF9PaWeBEx', 'ESx0sSWB8i', 'FU8oo6CK4U', 'f1APwALakZ', 'ktSPzNj795', 'ProcessDialogKey', 'd8o0IKdPSj', 'AIC0Pe2FBf', 'QNK007HdT6' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, ulQeCjbMDHB7w4nCRw.cs |
High entropy of concatenated method names: 'ol0or6Mqvf', 'CFKo91i2ED', 'q60oxtbc62', 'sPCxwHqDyT', 'zXOxzHCfCN', 'IrAoItG9sl', 'uO3oPfRYhp', 'Bd0o0dYOHC', 'vluotdpy9Q', 'DQPo16w0hQ' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, f8l6ydsUUxLZBoHa0q.cs |
High entropy of concatenated method names: 'q32d5Vg6lKGoY21OJ6k', 'n7TrFGg7UBKsHeJZjwj', 'EdtxEkPPHl', 'VvQxOU81fS', 'L7KxYdtkiW', 'GCduyLgZ1fU9FWIONgA', 'RtIo7Igw7r7eX6Bp0UG' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, jKdPSjanICe2FBfQNK.cs |
High entropy of concatenated method names: 'aSKEcfjHJL', 'aJ9EsCE85D', 'ACbE5UBhNk', 'dmvEVFjRh6', 'el0EBpf25p', 'bxUEN8rjvg', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, NHiJx8dK0vlYEtinnm.cs |
High entropy of concatenated method names: 'P4ZXnaYjOb', 'd54XgO10ZT', 'vyA959loDW', 'smZ9VKZlvh', 'Fbq9ND3jF0', 'CIs9H4n76H', 'ai29befJMi', 'pNv9uXWquC', 'Gjx94IEHpw', 'cM69Db87t8' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, XJp8yKPI9TCfdAga7UT.cs |
High entropy of concatenated method names: 'K2jOpXFQh4', 'sD0OS7tueF', 'nUkOWpIRqa', 'YTjO8psTxO', 'H8xOnQVMtO', 'cAgOhLUy0L', 'NhGOgH6Yqs', 'W7VOTeOLd7', 'yEuOU7BGfG', 'IwVOdTN9oJ' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, vtoUeaQlyeJCI1QUmm.cs |
High entropy of concatenated method names: 'N5AlTQ8VeN', 'ayalULLxgG', 'XSolcRjgte', 'ooGlsa8tBG', 'kvQlVnLs2Y', 'UAdlNSWTiQ', 'KGClbx0gD3', 'd7IluyIE8q', 'nHalDi8HN4', 'iw6ljaB46o' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, rTfa5bAroFj3akefBJ.cs |
High entropy of concatenated method names: 'opet7oIWjR', 'B28tr1tH8M', 'S9FtJwJ5m3', 'hgmt9kZH15', 'j76tXNnpMu', 'ajhtxU8hfF', 'KrFto2n5bD', 'H5VtANCb8f', 'GFptyobMM4', 'LvqtmenBiL' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, HEfuBjPtoGIsVlP13HW.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TgIYBqNlei', 'ut3YvhyOQw', 'jMTYCDXek9', 'r6EYf54Ehe', 'JLCYkcIieF', 'wBUYZYpDgb', 'CXnYK14ufB' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, hn0STnT66964Vkc389.cs |
High entropy of concatenated method names: 'dnaJBL7Iua', 'NsJJvExmgi', 'PChJC5mS4S', 'svZJfqFVki', 'r39JkA9JeS', 'w86JZLpig5', 'ICQJKgp1R4', 'OdrJ3rIVRD', 'VLQJa4W9jw', 'VbxJwifLkH' |
Source: 0.2.gunzipped.exe.a270000.12.raw.unpack, MJclrqZHjO7Fdl7QeF.cs |
High entropy of concatenated method names: 'qu4e3Ik1Mh', 'nlkewg5aJx', 'cXCEIA5YP7', 'mVEEPqWQmP', 'z2Rej2TYJg', 'XmReGaTvJv', 'mY0eQmwCc7', 'qT0eBqeccR', 'iCQevDXc5Z', 'DRBeCy2avH' |
Source: 0.2.gunzipped.exe.3d49970.7.raw.unpack, V4uC3Iifq56IKQcfry.cs |
High entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv' |
Source: 0.2.gunzipped.exe.3d49970.7.raw.unpack, vpednoN8EZgsJ4TDwx.cs |
High entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT' |
Source: 0.2.gunzipped.exe.76c0000.11.raw.unpack, V4uC3Iifq56IKQcfry.cs |
High entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv' |
Source: 0.2.gunzipped.exe.76c0000.11.raw.unpack, vpednoN8EZgsJ4TDwx.cs |
High entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, bqm8VYzAoI4TqX0HlQ.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pggOlnLVtw', 'GCnOLISRm7', 'L3xO2ORmMg', 'NdMOeHmSi8', 'UXqOEnElsb', 'FyqOOBnNQN', 'TS0OYZ4NOf' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, TBf20b07Pm0yAXHpaX.cs |
High entropy of concatenated method names: 'UUvW6LdP1', 'mHr8x0cEH', 'UXPhVKxn4', 'fvlg3IZAy', 'irrUNUbB1', 'eCldUGynG', 'mf61ydnNeuI55gRfRG', 'suMk0wr38nxm7KVlO1', 'STkEEmrac', 'jyQYhdkrN' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, lfMEOk1XbiFlh7aNLt.cs |
High entropy of concatenated method names: 'KF9Pon0STn', 't69PA64Vkc', 'aSHPmrCiA0', 'a1rPqTDHiJ', 'cinPLnmYq6', 'gk2P2qw6Ic', 'oKIMS2CuiiVo5VmgFu', 'G7NL27uA9aAZJn0qPy', 'slxPPNKHnk', 'QahPtBKE1q' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, SrGMToCY8IuKIaqFwN.cs |
High entropy of concatenated method names: 'ToString', 'DOf2j9F6fx', 'X2y2sggvVD', 'JhU25pYMP9', 'Fud2VKsqD0', 'f862NnD3pQ', 'nuX2H9AAu5', 'k362boR364', 'IZe2uX6Ge8', 'P6W244IAAK' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, WpAqRTfsZwXL6EEweX.cs |
High entropy of concatenated method names: 'ERKemRshCS', 'FcXeqg58w5', 'ToString', 'aLVervj2Qw', 'uR7eJMHngJ', 'WExe9Y06AW', 'rCAeXaX3dv', 'DoMex0fnB5', 'v9LeofAvoH', 'IYweAq9vnV' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, dAALak3ZAtSNj79518.cs |
High entropy of concatenated method names: 'PxgErR5Eob', 'YTmEJ4wGV5', 'q6sE9ptCBg', 'jb7EXsIRF7', 'FOeExvBS6y', 'GuwEotsLP6', 'cFmEAGCPS8', 'qN5EyQs0IL', 'cJEEmaIHxx', 'uroEqY8JmE' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, tG9fxIUSHrCiA0I1rT.cs |
High entropy of concatenated method names: 'ofF98Ey09K', 'FTt9h9yJLm', 'lsO9TyQff4', 'vot9UP0Nmh', 'bXS9L8KIjo', 'ovZ928jMJW', 'PGK9eQk9lm', 'WHO9EJ2ZIx', 'KBZ9OQQmtL', 'Bqe9Y9m24b' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, XlBHpd48ALb7kEfdTk.cs |
High entropy of concatenated method names: 'xpkop4PCCC', 'QZLoSTJXZX', 'l4voW5t6IY', 'AAAo8RDtSc', 'uq8onSHZZx', 'ba1oh5dchR', 'RIIogN0QN9', 'GHxoTo0dn1', 'rddoUsYdvN', 'w5uodmuqe2' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, tq6Jk2cqw6IcgF03NR.cs |
High entropy of concatenated method names: 'bN6x736MGg', 'GqmxJA28Wi', 'K8txXSPrny', 'wJfxopXXDw', 'ldDxA1lLU3', 'skOXk0pKUK', 'UR9XZmAjCI', 'M1OXKTnnhi', 'Sh1X3PbFbO', 'eidXa8rPDH' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, eHdT6rwUbADaxa7kJW.cs |
High entropy of concatenated method names: 'ojiOPBg4o0', 'qnpOtcwCUa', 'h2gO1OuHN7', 'MtxOr3Z98C', 'OtsOJDHiDk', 'HELOXIRDWG', 'avHOxqsmeT', 'L9gEKVBPIv', 'Dm1E3Tdy1f', 'OJfEaXrf3y' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, B8eLaGJcwW1e49fRCP.cs |
High entropy of concatenated method names: 'Dispose', 'cF9PaWeBEx', 'ESx0sSWB8i', 'FU8oo6CK4U', 'f1APwALakZ', 'ktSPzNj795', 'ProcessDialogKey', 'd8o0IKdPSj', 'AIC0Pe2FBf', 'QNK007HdT6' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, ulQeCjbMDHB7w4nCRw.cs |
High entropy of concatenated method names: 'ol0or6Mqvf', 'CFKo91i2ED', 'q60oxtbc62', 'sPCxwHqDyT', 'zXOxzHCfCN', 'IrAoItG9sl', 'uO3oPfRYhp', 'Bd0o0dYOHC', 'vluotdpy9Q', 'DQPo16w0hQ' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, f8l6ydsUUxLZBoHa0q.cs |
High entropy of concatenated method names: 'q32d5Vg6lKGoY21OJ6k', 'n7TrFGg7UBKsHeJZjwj', 'EdtxEkPPHl', 'VvQxOU81fS', 'L7KxYdtkiW', 'GCduyLgZ1fU9FWIONgA', 'RtIo7Igw7r7eX6Bp0UG' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, jKdPSjanICe2FBfQNK.cs |
High entropy of concatenated method names: 'aSKEcfjHJL', 'aJ9EsCE85D', 'ACbE5UBhNk', 'dmvEVFjRh6', 'el0EBpf25p', 'bxUEN8rjvg', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, NHiJx8dK0vlYEtinnm.cs |
High entropy of concatenated method names: 'P4ZXnaYjOb', 'd54XgO10ZT', 'vyA959loDW', 'smZ9VKZlvh', 'Fbq9ND3jF0', 'CIs9H4n76H', 'ai29befJMi', 'pNv9uXWquC', 'Gjx94IEHpw', 'cM69Db87t8' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, XJp8yKPI9TCfdAga7UT.cs |
High entropy of concatenated method names: 'K2jOpXFQh4', 'sD0OS7tueF', 'nUkOWpIRqa', 'YTjO8psTxO', 'H8xOnQVMtO', 'cAgOhLUy0L', 'NhGOgH6Yqs', 'W7VOTeOLd7', 'yEuOU7BGfG', 'IwVOdTN9oJ' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, vtoUeaQlyeJCI1QUmm.cs |
High entropy of concatenated method names: 'N5AlTQ8VeN', 'ayalULLxgG', 'XSolcRjgte', 'ooGlsa8tBG', 'kvQlVnLs2Y', 'UAdlNSWTiQ', 'KGClbx0gD3', 'd7IluyIE8q', 'nHalDi8HN4', 'iw6ljaB46o' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, rTfa5bAroFj3akefBJ.cs |
High entropy of concatenated method names: 'opet7oIWjR', 'B28tr1tH8M', 'S9FtJwJ5m3', 'hgmt9kZH15', 'j76tXNnpMu', 'ajhtxU8hfF', 'KrFto2n5bD', 'H5VtANCb8f', 'GFptyobMM4', 'LvqtmenBiL' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, HEfuBjPtoGIsVlP13HW.cs |
High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TgIYBqNlei', 'ut3YvhyOQw', 'jMTYCDXek9', 'r6EYf54Ehe', 'JLCYkcIieF', 'wBUYZYpDgb', 'CXnYK14ufB' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, hn0STnT66964Vkc389.cs |
High entropy of concatenated method names: 'dnaJBL7Iua', 'NsJJvExmgi', 'PChJC5mS4S', 'svZJfqFVki', 'r39JkA9JeS', 'w86JZLpig5', 'ICQJKgp1R4', 'OdrJ3rIVRD', 'VLQJa4W9jw', 'VbxJwifLkH' |
Source: 0.2.gunzipped.exe.490fe90.6.raw.unpack, MJclrqZHjO7Fdl7QeF.cs |
High entropy of concatenated method names: 'qu4e3Ik1Mh', 'nlkewg5aJx', 'cXCEIA5YP7', 'mVEEPqWQmP', 'z2Rej2TYJg', 'XmReGaTvJv', 'mY0eQmwCc7', 'qT0eBqeccR', 'iCQevDXc5Z', 'DRBeCy2avH' |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Process information set: NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Users\user\Desktop\gunzipped.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\gunzipped.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Queries volume information: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\mPvIOxEZXJsdYp.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |