Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E53000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.000000000307F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?L |
Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E73000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002E53000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.000000000308F000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.000000000307F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mail.gemssystems.com |
Source: VSVy.exe, 00000000.00000002.2243490956.0000000002B97000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2433322042.00000000029F3000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000436000.00000040.00000400.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20a |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: gJfOOh.exe, 00000010.00000002.3903689735.0000000003105000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003105000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en4 |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E87000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enH |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003100000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002D3F000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002FAE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002D3F000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002FAE000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: gJfOOh.exe, 00000010.00000002.3903689735.0000000002FAE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002D6F000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: gJfOOh.exe, 00000010.00000002.3903689735.0000000003136000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003136000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/4 |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002EB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/H |
Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002EC2000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lB |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F42200 | 0_2_00F42200 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F46308 | 0_2_00F46308 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F420A5 | 0_2_00F420A5 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F421F0 | 0_2_00F421F0 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F43510 | 0_2_00F43510 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F46513 | 0_2_00F46513 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F458FB | 0_2_00F458FB |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F419BC | 0_2_00F419BC |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F41947 | 0_2_00F41947 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F41912 | 0_2_00F41912 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F45908 | 0_2_00F45908 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F42A98 | 0_2_00F42A98 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F42A88 | 0_2_00F42A88 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F41BC8 | 0_2_00F41BC8 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F41B22 | 0_2_00F41B22 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F41CB6 | 0_2_00F41CB6 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F41EDA | 0_2_00F41EDA |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_00F41F26 | 0_2_00F41F26 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028D6B58 | 0_2_028D6B58 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028D5E70 | 0_2_028D5E70 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028DA3D0 | 0_2_028DA3D0 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028DA3E0 | 0_2_028DA3E0 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028DA0E0 | 0_2_028DA0E0 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028DA0F0 | 0_2_028DA0F0 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028D906A | 0_2_028D906A |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028D5889 | 0_2_028D5889 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_028D5894 | 0_2_028D5894 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_095788A8 | 0_2_095788A8 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_09570EB1 | 0_2_09570EB1 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_0957A901 | 0_2_0957A901 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_09570850 | 0_2_09570850 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_09570842 | 0_2_09570842 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_09779350 | 0_2_09779350 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_097729F8 | 0_2_097729F8 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_097711B8 | 0_2_097711B8 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_097715F0 | 0_2_097715F0 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_09770D80 | 0_2_09770D80 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_09772E30 | 0_2_09772E30 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 0_2_09772E20 | 0_2_09772E20 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012C7118 | 10_2_012C7118 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CC146 | 10_2_012CC146 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CA088 | 10_2_012CA088 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012C5370 | 10_2_012C5370 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CD278 | 10_2_012CD278 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CC468 | 10_2_012CC468 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CC738 | 10_2_012CC738 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012C69A0 | 10_2_012C69A0 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CE988 | 10_2_012CE988 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CCA08 | 10_2_012CCA08 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CCCD8 | 10_2_012CCCD8 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CCFAA | 10_2_012CCFAA |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012C3E09 | 10_2_012C3E09 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CF961 | 10_2_012CF961 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012CE97A | 10_2_012CE97A |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012C29EC | 10_2_012C29EC |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_012C3AB1 | 10_2_012C3AB1 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_068EB978 | 10_2_068EB978 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_068E4E1F | 10_2_068E4E1F |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_068E4E20 | 10_2_068E4E20 |
Source: C:\Users\user\Desktop\VSVy.exe | Code function: 10_2_068E1B4C | 10_2_068E1B4C |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D6CA1 | 11_2_049D6CA1 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D5A86 | 11_2_049D5A86 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D5598 | 11_2_049D5598 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D55A1 | 11_2_049D55A1 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D55D4 | 11_2_049D55D4 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D55C8 | 11_2_049D55C8 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049DA290 | 11_2_049DA290 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049DA2A0 | 11_2_049DA2A0 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D9330 | 11_2_049D9330 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D9FB8 | 11_2_049D9FB8 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_049D9FB6 | 11_2_049D9FB6 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E38038 | 11_2_04E38038 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E32200 | 11_2_04E32200 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E334D1 | 11_2_04E334D1 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E33510 | 11_2_04E33510 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E38029 | 11_2_04E38029 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E331F9 | 11_2_04E331F9 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E3211D | 11_2_04E3211D |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E31287 | 11_2_04E31287 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E38243 | 11_2_04E38243 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E31912 | 11_2_04E31912 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E32A88 | 11_2_04E32A88 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04E32A98 | 11_2_04E32A98 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04FE8718 | 11_2_04FE8718 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04FE2FC8 | 11_2_04FE2FC8 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04FE2FB8 | 11_2_04FE2FB8 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04FE0F50 | 11_2_04FE0F50 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04FE2B90 | 11_2_04FE2B90 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04FE1388 | 11_2_04FE1388 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 11_2_04FE0B18 | 11_2_04FE0B18 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9D278 | 16_2_02D9D278 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D95370 | 16_2_02D95370 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9A088 | 16_2_02D9A088 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9C147 | 16_2_02D9C147 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9C738 | 16_2_02D9C738 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9C468 | 16_2_02D9C468 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9CA08 | 16_2_02D9CA08 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9E988 | 16_2_02D9E988 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D969A0 | 16_2_02D969A0 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D93E09 | 16_2_02D93E09 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D96FC8 | 16_2_02D96FC8 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9CFA9 | 16_2_02D9CFA9 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9CCD8 | 16_2_02D9CCD8 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D93AA1 | 16_2_02D93AA1 |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D939ED | 16_2_02D939ED |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D929EC | 16_2_02D929EC |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9E97B | 16_2_02D9E97B |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Code function: 16_2_02D9F961 | 16_2_02D9F961 |
Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: VSVy.exe PID: 6208, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: fastprox.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: ncobjapi.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mpclient.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wmitomi.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: rasapi32.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: rasman.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: rtutils.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: secur32.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Section loaded: dpapi.dll | |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, eUuEe4OrV40VRtn7Np.cs | High entropy of concatenated method names: 'hhMIpnwKYE', 'qqTIwZ6ETF', 'zYbICywveu', 'wbuIOtS61d', 'DwmIvx8pIM', 'wNKI8fkvei', 'qNqIGTVBCO', 'gk7I26duHN', 'ueWIatT680', 'GtpIR3kdEc' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, gcOGR2CVZ5gWDXuqnV.cs | High entropy of concatenated method names: 'JtKjTEJHfo', 'gatj5QdH2S', 'G7KjLIouVo', 'hcyjdafyKF', 'BL6jDC6HJq', 'i9GjgfR4Bw', 'Df3j1Hn7Ry', 'rtojE13tvP', 'hsYjVrRFXi', 'I6FjKcgVPX' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, lurOhwghi3TY9aVipT.cs | High entropy of concatenated method names: 'b9YGEV9Axw', 'KuoGKcAWRy', 'qGQ2kh3Zck', 'wLG2r9ao1a', 'CTKGPtnE0Z', 'WvgGmLbgOf', 'v9AGiZ8v6Z', 'VrYGTxCpgk', 'tnJG5Z6MF6', 'nTGGLPTjIh' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, ac6w5O1eEbbLSHhbcg.cs | High entropy of concatenated method names: 'q5KavWlCbJ', 'W21aGt4oQk', 'uufaa656b8', 'lvqa93DraN', 'FDQatTWb9U', 'z7EahUBJ4R', 'Dispose', 'dHd2UvUO3e', 'SsB2jPQOnV', 'JN22INeixm' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, d9mYAbiG8Tuy8A3ufE.cs | High entropy of concatenated method names: 'CkafC174wm', 'PsIfOVacWy', 'rxJfntClVc', 'QDBfJoQQb7', 'uAPfe527po', 'KjBfSXailh', 'J1vfYpGojP', 'GdZfsDZuj8', 'LSgfFdRHS9', 'IYBfP2Hnnc' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, yeorbijDlEpM0W5tPK.cs | High entropy of concatenated method names: 'Dispose', 'hbLrVSHhbc', 'pNr6JkmuH7', 'yiNAHWbeOx', 'V8brKL0rlp', 'Qdtrz0qUTD', 'ProcessDialogKey', 'wfI6k4bNq7', 'JrG6r1iAtt', 'YXF66RwTNf' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, YYVFxextRxUwTnW85c.cs | High entropy of concatenated method names: 'uBHbyg9CiB', 'JJgbZ3Ey62', 'i3UI3ooS1l', 'WQnIeNXKW9', 'ob7ISVeqnw', 'aNWIMFqt6D', 'LV9IYTyT77', 'WfIIsIcM3G', 'erZIA3h5xQ', 'OWeIFiArVY' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, RkPOokr6VwmXIDrvXG0.cs | High entropy of concatenated method names: 'ToString', 'fgR9C2l0XB', 'GeI9OTYph8', 'r0x9ximCa0', 'gBe9nCD1MY', 'yeV9J76ISo', 'Uvc93Eyp05', 'rU29eTYiPK', 'JgmE5eMbrVxMQiqmuQX', 'Kee6kqM8hD2OEmJEDvd' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, zPWXsvrkcqmULf5tUA8.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'oWbRPP2xUL', 'd5bRm2CgyE', 'WxLRiuhuEb', 'rCNRTM3vyS', 'AmaR501ca0', 'UdZRLfPUl1', 'ML8Rd2FeCT' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, g4bNq7VSrG1iAttKXF.cs | High entropy of concatenated method names: 'svuansxNWr', 'IMmaJXH9tT', 'cFBa3NUF03', 'GeUaefLjlC', 'DjUaS89LIc', 'kFpaMBrZ5C', 'VtdaYkyfPw', 'hvXasN1NW6', 'aDJaAua1Jj', 'TIfaF2rS10' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, Ym7FTqrrMHR6DHoFZ8m.cs | High entropy of concatenated method names: 'qDLRKGn7HK', 'sedRzGIIQA', 'cCn9kN2jbS', 'xIg9rYnQhT', 'hIp967R24t', 'ieb9B7sFdy', 'S5C9of0ZxS', 'pjx9X7JbIT', 'tSw9UXBfZb', 'Yme9joHOuy' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, OARC1yL0uWy4BH6F7h.cs | High entropy of concatenated method names: 'ToString', 'TSX8PUuDrc', 'GPU8JIt8d2', 'w8b83YRbkx', 'b4X8e646oP', 'nFm8SKsiCQ', 'pDH8M9aHQa', 'LaC8YaDWBf', 'iNh8s90H3l', 'WhS8AvJGDx' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, qXKZM5zrBxYMqPeTWi.cs | High entropy of concatenated method names: 'jheRwR8pxG', 'vT9RCNUfpG', 'j9BRONsGfF', 'ycXRnF6FTK', 'U5yRJoNqN5', 'Xr9RekXYI3', 'GOHRSQjZvX', 'mHvRhTjryt', 'sJlRc63jiL', 'R2iRWsANci' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, oMDSaYYRMNNMy5VfMZ.cs | High entropy of concatenated method names: 'gxkNUJrv5e', 'RR4NIYLEwh', 'TUoNQI1MCB', 'BrOQKc6bxD', 'wOMQzB7j0w', 'OKqNkYQswx', 'bhxNrAGdvT', 'FW7N69FVxX', 'fUANBDgm03', 'EWvNoQqPsH' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, S6q8GFqt3n1GOBenTk.cs | High entropy of concatenated method names: 'XRnBXYWolf', 'eQoBU6xRCZ', 'OqrBjXEUSB', 'FmABIg7XsE', 'yJEBbFpYvA', 'CvvBQdyxnO', 'CpVBNABHAE', 'vhxBqGEQrF', 'yYSB7Tacix', 'zdYBuKv79C' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, wQSAsG6pNOb7pFtqdn.cs | High entropy of concatenated method names: 'D1dHVDnQV', 'YD2pDdOmN', 'omtw7oVsU', 'AMpZMw15q', 'uSWOgQnb1', 'r6cxuUbXu', 'EYodckNsGBEkaMyduu', 'zj9CmaJiU23Ai36Zno', 'tjH21uJga', 'XinRpqAVq' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, twTNfiKb8tBU2cUUal.cs | High entropy of concatenated method names: 'AyURIxu4AN', 'VJcRbkgHZ3', 'g87RQEbo3a', 'rtjRNOY72Q', 'TDdRae9AXj', 'JhsRqWSaco', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, JkguQeIVDOPyJdc7Du.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F7W6VRWgSX', 'UQ96K6Q2gi', 'QVH6zCFT8x', 'gQ7BkXrgA3', 'vCbBrX5kWY', 'fqBB6ElgDX', 'Je9BBGNZvy', 'i4w2qb6bwGlc2l3PWce' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, ApGDyorooBMAocqJ6OU.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pd40aWLTZM', 'knF0RFsv1o', 'Kie09XbiMw', 'vNY00V7w8j', 'QnF0tmkMFf', 'PDB0llHdgK', 'Ogc0hkK4SM' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, lC4I8sdOAG6ZfqykOA.cs | High entropy of concatenated method names: 'ywoGuIa29p', 'tCJG4g3WCK', 'ToString', 'CpuGUQIJtX', 'L3aGjLNhbF', 'hwlGIuHMty', 'kfwGbARiHy', 'ltuGQSinqY', 'i0sGNntXM8', 'khHGqqMy2O' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, B5DSDenORf7OfAgO3T.cs | High entropy of concatenated method names: 'Jv5QXZ3s38', 'mSIQjk60OQ', 'bmIQbtK4cD', 'wyBQNkYf8R', 'dtvQqAN5He', 'w52bDkc9TA', 'og8bgwSW8t', 'lHlb1gqTik', 'RvrbEw0tE4', 'FIbbVBkBCS' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, JwB9hNAUuhRD4qMKMu.cs | High entropy of concatenated method names: 'okJNcmfEAH', 'qiINWckl4x', 'n3LNHmmtHZ', 'WDsNpTxkBh', 'AngNytucUD', 'xouNwr4CNK', 'gF1NZPnWGg', 'k7dNCsW1Xq', 'iR1NOKicmE', 'JJFNxYecnH' |
Source: 0.2.VSVy.exe.447b420.6.raw.unpack, Rw6U9HoytPh3C58fNu.cs | High entropy of concatenated method names: 'WTjrNcOGR2', 'XZ5rqgWDXu', 'nrVru40VRt', 'G7Nr4pKYVF', 'FW8rv5cy5D', 'JDer8ORf7O', 'aSoZS0mgjWVQbLDGSf', 'iaaqv4jEsWpdtjsMII', 'h32rrFQR7d', 'N6RrBwGcRi' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, eUuEe4OrV40VRtn7Np.cs | High entropy of concatenated method names: 'hhMIpnwKYE', 'qqTIwZ6ETF', 'zYbICywveu', 'wbuIOtS61d', 'DwmIvx8pIM', 'wNKI8fkvei', 'qNqIGTVBCO', 'gk7I26duHN', 'ueWIatT680', 'GtpIR3kdEc' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, gcOGR2CVZ5gWDXuqnV.cs | High entropy of concatenated method names: 'JtKjTEJHfo', 'gatj5QdH2S', 'G7KjLIouVo', 'hcyjdafyKF', 'BL6jDC6HJq', 'i9GjgfR4Bw', 'Df3j1Hn7Ry', 'rtojE13tvP', 'hsYjVrRFXi', 'I6FjKcgVPX' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, lurOhwghi3TY9aVipT.cs | High entropy of concatenated method names: 'b9YGEV9Axw', 'KuoGKcAWRy', 'qGQ2kh3Zck', 'wLG2r9ao1a', 'CTKGPtnE0Z', 'WvgGmLbgOf', 'v9AGiZ8v6Z', 'VrYGTxCpgk', 'tnJG5Z6MF6', 'nTGGLPTjIh' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, ac6w5O1eEbbLSHhbcg.cs | High entropy of concatenated method names: 'q5KavWlCbJ', 'W21aGt4oQk', 'uufaa656b8', 'lvqa93DraN', 'FDQatTWb9U', 'z7EahUBJ4R', 'Dispose', 'dHd2UvUO3e', 'SsB2jPQOnV', 'JN22INeixm' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, d9mYAbiG8Tuy8A3ufE.cs | High entropy of concatenated method names: 'CkafC174wm', 'PsIfOVacWy', 'rxJfntClVc', 'QDBfJoQQb7', 'uAPfe527po', 'KjBfSXailh', 'J1vfYpGojP', 'GdZfsDZuj8', 'LSgfFdRHS9', 'IYBfP2Hnnc' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, yeorbijDlEpM0W5tPK.cs | High entropy of concatenated method names: 'Dispose', 'hbLrVSHhbc', 'pNr6JkmuH7', 'yiNAHWbeOx', 'V8brKL0rlp', 'Qdtrz0qUTD', 'ProcessDialogKey', 'wfI6k4bNq7', 'JrG6r1iAtt', 'YXF66RwTNf' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, YYVFxextRxUwTnW85c.cs | High entropy of concatenated method names: 'uBHbyg9CiB', 'JJgbZ3Ey62', 'i3UI3ooS1l', 'WQnIeNXKW9', 'ob7ISVeqnw', 'aNWIMFqt6D', 'LV9IYTyT77', 'WfIIsIcM3G', 'erZIA3h5xQ', 'OWeIFiArVY' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, RkPOokr6VwmXIDrvXG0.cs | High entropy of concatenated method names: 'ToString', 'fgR9C2l0XB', 'GeI9OTYph8', 'r0x9ximCa0', 'gBe9nCD1MY', 'yeV9J76ISo', 'Uvc93Eyp05', 'rU29eTYiPK', 'JgmE5eMbrVxMQiqmuQX', 'Kee6kqM8hD2OEmJEDvd' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, zPWXsvrkcqmULf5tUA8.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'oWbRPP2xUL', 'd5bRm2CgyE', 'WxLRiuhuEb', 'rCNRTM3vyS', 'AmaR501ca0', 'UdZRLfPUl1', 'ML8Rd2FeCT' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, g4bNq7VSrG1iAttKXF.cs | High entropy of concatenated method names: 'svuansxNWr', 'IMmaJXH9tT', 'cFBa3NUF03', 'GeUaefLjlC', 'DjUaS89LIc', 'kFpaMBrZ5C', 'VtdaYkyfPw', 'hvXasN1NW6', 'aDJaAua1Jj', 'TIfaF2rS10' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, Ym7FTqrrMHR6DHoFZ8m.cs | High entropy of concatenated method names: 'qDLRKGn7HK', 'sedRzGIIQA', 'cCn9kN2jbS', 'xIg9rYnQhT', 'hIp967R24t', 'ieb9B7sFdy', 'S5C9of0ZxS', 'pjx9X7JbIT', 'tSw9UXBfZb', 'Yme9joHOuy' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, OARC1yL0uWy4BH6F7h.cs | High entropy of concatenated method names: 'ToString', 'TSX8PUuDrc', 'GPU8JIt8d2', 'w8b83YRbkx', 'b4X8e646oP', 'nFm8SKsiCQ', 'pDH8M9aHQa', 'LaC8YaDWBf', 'iNh8s90H3l', 'WhS8AvJGDx' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, qXKZM5zrBxYMqPeTWi.cs | High entropy of concatenated method names: 'jheRwR8pxG', 'vT9RCNUfpG', 'j9BRONsGfF', 'ycXRnF6FTK', 'U5yRJoNqN5', 'Xr9RekXYI3', 'GOHRSQjZvX', 'mHvRhTjryt', 'sJlRc63jiL', 'R2iRWsANci' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, oMDSaYYRMNNMy5VfMZ.cs | High entropy of concatenated method names: 'gxkNUJrv5e', 'RR4NIYLEwh', 'TUoNQI1MCB', 'BrOQKc6bxD', 'wOMQzB7j0w', 'OKqNkYQswx', 'bhxNrAGdvT', 'FW7N69FVxX', 'fUANBDgm03', 'EWvNoQqPsH' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, S6q8GFqt3n1GOBenTk.cs | High entropy of concatenated method names: 'XRnBXYWolf', 'eQoBU6xRCZ', 'OqrBjXEUSB', 'FmABIg7XsE', 'yJEBbFpYvA', 'CvvBQdyxnO', 'CpVBNABHAE', 'vhxBqGEQrF', 'yYSB7Tacix', 'zdYBuKv79C' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, wQSAsG6pNOb7pFtqdn.cs | High entropy of concatenated method names: 'D1dHVDnQV', 'YD2pDdOmN', 'omtw7oVsU', 'AMpZMw15q', 'uSWOgQnb1', 'r6cxuUbXu', 'EYodckNsGBEkaMyduu', 'zj9CmaJiU23Ai36Zno', 'tjH21uJga', 'XinRpqAVq' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, twTNfiKb8tBU2cUUal.cs | High entropy of concatenated method names: 'AyURIxu4AN', 'VJcRbkgHZ3', 'g87RQEbo3a', 'rtjRNOY72Q', 'TDdRae9AXj', 'JhsRqWSaco', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, JkguQeIVDOPyJdc7Du.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F7W6VRWgSX', 'UQ96K6Q2gi', 'QVH6zCFT8x', 'gQ7BkXrgA3', 'vCbBrX5kWY', 'fqBB6ElgDX', 'Je9BBGNZvy', 'i4w2qb6bwGlc2l3PWce' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, ApGDyorooBMAocqJ6OU.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pd40aWLTZM', 'knF0RFsv1o', 'Kie09XbiMw', 'vNY00V7w8j', 'QnF0tmkMFf', 'PDB0llHdgK', 'Ogc0hkK4SM' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, lC4I8sdOAG6ZfqykOA.cs | High entropy of concatenated method names: 'ywoGuIa29p', 'tCJG4g3WCK', 'ToString', 'CpuGUQIJtX', 'L3aGjLNhbF', 'hwlGIuHMty', 'kfwGbARiHy', 'ltuGQSinqY', 'i0sGNntXM8', 'khHGqqMy2O' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, B5DSDenORf7OfAgO3T.cs | High entropy of concatenated method names: 'Jv5QXZ3s38', 'mSIQjk60OQ', 'bmIQbtK4cD', 'wyBQNkYf8R', 'dtvQqAN5He', 'w52bDkc9TA', 'og8bgwSW8t', 'lHlb1gqTik', 'RvrbEw0tE4', 'FIbbVBkBCS' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, JwB9hNAUuhRD4qMKMu.cs | High entropy of concatenated method names: 'okJNcmfEAH', 'qiINWckl4x', 'n3LNHmmtHZ', 'WDsNpTxkBh', 'AngNytucUD', 'xouNwr4CNK', 'gF1NZPnWGg', 'k7dNCsW1Xq', 'iR1NOKicmE', 'JJFNxYecnH' |
Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, Rw6U9HoytPh3C58fNu.cs | High entropy of concatenated method names: 'WTjrNcOGR2', 'XZ5rqgWDXu', 'nrVru40VRt', 'G7Nr4pKYVF', 'FW8rv5cy5D', 'JDer8ORf7O', 'aSoZS0mgjWVQbLDGSf', 'iaaqv4jEsWpdtjsMII', 'h32rrFQR7d', 'N6RrBwGcRi' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, eUuEe4OrV40VRtn7Np.cs | High entropy of concatenated method names: 'hhMIpnwKYE', 'qqTIwZ6ETF', 'zYbICywveu', 'wbuIOtS61d', 'DwmIvx8pIM', 'wNKI8fkvei', 'qNqIGTVBCO', 'gk7I26duHN', 'ueWIatT680', 'GtpIR3kdEc' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, gcOGR2CVZ5gWDXuqnV.cs | High entropy of concatenated method names: 'JtKjTEJHfo', 'gatj5QdH2S', 'G7KjLIouVo', 'hcyjdafyKF', 'BL6jDC6HJq', 'i9GjgfR4Bw', 'Df3j1Hn7Ry', 'rtojE13tvP', 'hsYjVrRFXi', 'I6FjKcgVPX' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, lurOhwghi3TY9aVipT.cs | High entropy of concatenated method names: 'b9YGEV9Axw', 'KuoGKcAWRy', 'qGQ2kh3Zck', 'wLG2r9ao1a', 'CTKGPtnE0Z', 'WvgGmLbgOf', 'v9AGiZ8v6Z', 'VrYGTxCpgk', 'tnJG5Z6MF6', 'nTGGLPTjIh' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, ac6w5O1eEbbLSHhbcg.cs | High entropy of concatenated method names: 'q5KavWlCbJ', 'W21aGt4oQk', 'uufaa656b8', 'lvqa93DraN', 'FDQatTWb9U', 'z7EahUBJ4R', 'Dispose', 'dHd2UvUO3e', 'SsB2jPQOnV', 'JN22INeixm' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, d9mYAbiG8Tuy8A3ufE.cs | High entropy of concatenated method names: 'CkafC174wm', 'PsIfOVacWy', 'rxJfntClVc', 'QDBfJoQQb7', 'uAPfe527po', 'KjBfSXailh', 'J1vfYpGojP', 'GdZfsDZuj8', 'LSgfFdRHS9', 'IYBfP2Hnnc' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, yeorbijDlEpM0W5tPK.cs | High entropy of concatenated method names: 'Dispose', 'hbLrVSHhbc', 'pNr6JkmuH7', 'yiNAHWbeOx', 'V8brKL0rlp', 'Qdtrz0qUTD', 'ProcessDialogKey', 'wfI6k4bNq7', 'JrG6r1iAtt', 'YXF66RwTNf' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, YYVFxextRxUwTnW85c.cs | High entropy of concatenated method names: 'uBHbyg9CiB', 'JJgbZ3Ey62', 'i3UI3ooS1l', 'WQnIeNXKW9', 'ob7ISVeqnw', 'aNWIMFqt6D', 'LV9IYTyT77', 'WfIIsIcM3G', 'erZIA3h5xQ', 'OWeIFiArVY' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, RkPOokr6VwmXIDrvXG0.cs | High entropy of concatenated method names: 'ToString', 'fgR9C2l0XB', 'GeI9OTYph8', 'r0x9ximCa0', 'gBe9nCD1MY', 'yeV9J76ISo', 'Uvc93Eyp05', 'rU29eTYiPK', 'JgmE5eMbrVxMQiqmuQX', 'Kee6kqM8hD2OEmJEDvd' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, zPWXsvrkcqmULf5tUA8.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'oWbRPP2xUL', 'd5bRm2CgyE', 'WxLRiuhuEb', 'rCNRTM3vyS', 'AmaR501ca0', 'UdZRLfPUl1', 'ML8Rd2FeCT' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, g4bNq7VSrG1iAttKXF.cs | High entropy of concatenated method names: 'svuansxNWr', 'IMmaJXH9tT', 'cFBa3NUF03', 'GeUaefLjlC', 'DjUaS89LIc', 'kFpaMBrZ5C', 'VtdaYkyfPw', 'hvXasN1NW6', 'aDJaAua1Jj', 'TIfaF2rS10' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, Ym7FTqrrMHR6DHoFZ8m.cs | High entropy of concatenated method names: 'qDLRKGn7HK', 'sedRzGIIQA', 'cCn9kN2jbS', 'xIg9rYnQhT', 'hIp967R24t', 'ieb9B7sFdy', 'S5C9of0ZxS', 'pjx9X7JbIT', 'tSw9UXBfZb', 'Yme9joHOuy' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, OARC1yL0uWy4BH6F7h.cs | High entropy of concatenated method names: 'ToString', 'TSX8PUuDrc', 'GPU8JIt8d2', 'w8b83YRbkx', 'b4X8e646oP', 'nFm8SKsiCQ', 'pDH8M9aHQa', 'LaC8YaDWBf', 'iNh8s90H3l', 'WhS8AvJGDx' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, qXKZM5zrBxYMqPeTWi.cs | High entropy of concatenated method names: 'jheRwR8pxG', 'vT9RCNUfpG', 'j9BRONsGfF', 'ycXRnF6FTK', 'U5yRJoNqN5', 'Xr9RekXYI3', 'GOHRSQjZvX', 'mHvRhTjryt', 'sJlRc63jiL', 'R2iRWsANci' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, oMDSaYYRMNNMy5VfMZ.cs | High entropy of concatenated method names: 'gxkNUJrv5e', 'RR4NIYLEwh', 'TUoNQI1MCB', 'BrOQKc6bxD', 'wOMQzB7j0w', 'OKqNkYQswx', 'bhxNrAGdvT', 'FW7N69FVxX', 'fUANBDgm03', 'EWvNoQqPsH' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, S6q8GFqt3n1GOBenTk.cs | High entropy of concatenated method names: 'XRnBXYWolf', 'eQoBU6xRCZ', 'OqrBjXEUSB', 'FmABIg7XsE', 'yJEBbFpYvA', 'CvvBQdyxnO', 'CpVBNABHAE', 'vhxBqGEQrF', 'yYSB7Tacix', 'zdYBuKv79C' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, wQSAsG6pNOb7pFtqdn.cs | High entropy of concatenated method names: 'D1dHVDnQV', 'YD2pDdOmN', 'omtw7oVsU', 'AMpZMw15q', 'uSWOgQnb1', 'r6cxuUbXu', 'EYodckNsGBEkaMyduu', 'zj9CmaJiU23Ai36Zno', 'tjH21uJga', 'XinRpqAVq' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, twTNfiKb8tBU2cUUal.cs | High entropy of concatenated method names: 'AyURIxu4AN', 'VJcRbkgHZ3', 'g87RQEbo3a', 'rtjRNOY72Q', 'TDdRae9AXj', 'JhsRqWSaco', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, JkguQeIVDOPyJdc7Du.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F7W6VRWgSX', 'UQ96K6Q2gi', 'QVH6zCFT8x', 'gQ7BkXrgA3', 'vCbBrX5kWY', 'fqBB6ElgDX', 'Je9BBGNZvy', 'i4w2qb6bwGlc2l3PWce' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, ApGDyorooBMAocqJ6OU.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pd40aWLTZM', 'knF0RFsv1o', 'Kie09XbiMw', 'vNY00V7w8j', 'QnF0tmkMFf', 'PDB0llHdgK', 'Ogc0hkK4SM' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, lC4I8sdOAG6ZfqykOA.cs | High entropy of concatenated method names: 'ywoGuIa29p', 'tCJG4g3WCK', 'ToString', 'CpuGUQIJtX', 'L3aGjLNhbF', 'hwlGIuHMty', 'kfwGbARiHy', 'ltuGQSinqY', 'i0sGNntXM8', 'khHGqqMy2O' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, B5DSDenORf7OfAgO3T.cs | High entropy of concatenated method names: 'Jv5QXZ3s38', 'mSIQjk60OQ', 'bmIQbtK4cD', 'wyBQNkYf8R', 'dtvQqAN5He', 'w52bDkc9TA', 'og8bgwSW8t', 'lHlb1gqTik', 'RvrbEw0tE4', 'FIbbVBkBCS' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, JwB9hNAUuhRD4qMKMu.cs | High entropy of concatenated method names: 'okJNcmfEAH', 'qiINWckl4x', 'n3LNHmmtHZ', 'WDsNpTxkBh', 'AngNytucUD', 'xouNwr4CNK', 'gF1NZPnWGg', 'k7dNCsW1Xq', 'iR1NOKicmE', 'JJFNxYecnH' |
Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, Rw6U9HoytPh3C58fNu.cs | High entropy of concatenated method names: 'WTjrNcOGR2', 'XZ5rqgWDXu', 'nrVru40VRt', 'G7Nr4pKYVF', 'FW8rv5cy5D', 'JDer8ORf7O', 'aSoZS0mgjWVQbLDGSf', 'iaaqv4jEsWpdtjsMII', 'h32rrFQR7d', 'N6RrBwGcRi' |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3900002399.0000000001036000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=n |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: VSVy.exe, 0000000A.00000002.3900170183.0000000000F66000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Users\user\Desktop\VSVy.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Users\user\Desktop\VSVy.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\VSVy.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Users\user\AppData\Roaming\gJfOOh.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Users\user\AppData\Roaming\gJfOOh.exe VolumeInformation | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | |
Source: C:\Users\user\AppData\Roaming\gJfOOh.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | |