Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comd |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000346C000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: Payment Advice.exe, 00000005.00000002.2996681350.0000000003401000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/d |
Source: Payment Advice.exe, 00000000.00000002.1764232871.0000000003DD1000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000000.00000002.1764232871.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000005.00000002.2994910866.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.orgd |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000349C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000349C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.orgd |
Source: Payment Advice.exe, 00000000.00000002.1762503668.000000000308E000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000005.00000002.2996681350.0000000003401000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fonts.com |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.tiro.com |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.typography.netD |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: Payment Advice.exe, 00000000.00000002.1766484792.0000000007002000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: Payment Advice.exe, 00000000.00000002.1764232871.0000000003DD1000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000000.00000002.1764232871.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000005.00000002.2994910866.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id= |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: Payment Advice.exe, 00000000.00000002.1764232871.0000000003DD1000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000000.00000002.1764232871.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Payment Advice.exe, 00000005.00000002.2994910866.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d |
Source: Payment Advice.exe, 00000005.00000002.2996681350.000000000347E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l |
Source: 0.2.Payment Advice.exe.3db1398.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.Payment Advice.exe.3db1398.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.Payment Advice.exe.3e343a8.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.Payment Advice.exe.3e343a8.5.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.Payment Advice.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 5.2.Payment Advice.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.Payment Advice.exe.3db1398.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.Payment Advice.exe.3db1398.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.Payment Advice.exe.3e343a8.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000005.00000002.2994910866.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1764232871.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1764232871.0000000003DD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: Payment Advice.exe PID: 2708, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: Payment Advice.exe PID: 5216, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, u24XxM8uRIoTpav9E2.cs | High entropy of concatenated method names: 'Ios4oGXpVE', 'JaS43scBeL', 'TBt4IZVdnL', 'Nnk4EH0nCN', 'u77xs4dgjMve3awyxvI', 'O3tkUMdP1ohbgdHMHYI', 'nJx62sdojb8rgr5eyNK', 'QBh6ypdfVqfP5J2x7Rr' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, V0od1GpONNlKZ74lAd.cs | High entropy of concatenated method names: 'oS3tLhb6ui', 'wnSt81ZogZ', 'niytc7xIW5', 'PkZt5RaBEy', 'pW7tA9Ks8u', 'r5OtOeiP7L', 'i67toF6ibk', 'VhVt3sAdi3', 'lp2tI0WnR1', 'r4ltEeq9p8' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, cLBVf8vxft4stwplCk.cs | High entropy of concatenated method names: 'uElDYUnniX', 'qogD1XJsBH', 'tioDVn8w2Y', 'FH4D2lL56N', 'JJqDBE6415', 't9YDlYQY0r', 'FJTDb9UAn3', 'CVHDpbkaFi', 'JBVDqG6yfg', 'CjYDdZpFKD' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, V1TjnGssHvunMsGa5Eb.cs | High entropy of concatenated method names: 'F76iEa8fgP', 'ceFizyETVh', 'A3RMwjioeJ', 'YwyMsUdBrI', 'sF0MgwYuOY', 'YQUMKETxmp', 'Xb9MWXh4Hh', 'pHwMTEuCc3', 'lFRMuSQhnO', 'BmMMtN1dst' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, Tmqavsg8mMuu42rPYF.cs | High entropy of concatenated method names: 'gBEVYjiLK', 'vDp21M1HV', 'PPll7Bbmq', 'sfGbUrCKj', 'nw5qNo1PP', 'FE8dG5wEe', 'qikmx7lMJdk2CscBwb', 'DcWTOK2vGElA0VANfu', 'C2djIZ4UW', 'Nu4irNR9L' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, e0GJdvoX7FLALSqXBB.cs | High entropy of concatenated method names: 'Dd9G4GrfyS', 'N1QGUR1VYv', 'VEbGGPruDn', 'qSCGMqqJoK', 'jOFGPSBcJ7', 'HyvGrEnRVI', 'Dispose', 'VFtjuhdk7F', 'm37jtMfqL6', 'YDyj7SNKlk' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, D7kjX5E8wnBR9dmFol.cs | High entropy of concatenated method names: 'vRBi7GLes8', 'tCPiFW8OMc', 'aeuiyIphdE', 'FhOiDjfv2O', 'gmQiGTJa1Z', 'iDDi9Wkdwk', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, mLmW3OCpnpqE18nJXc.cs | High entropy of concatenated method names: 'TdlXpRo1yS', 'LKnXqqTky2', 'fmMXhJjOi7', 'xekXedIG9D', 'xahXnZt4yI', 'zp9XQ7URUX', 'J2UXxc0chi', 'yALXNNAHme', 'DVAXSfVHR9', 'CbpXmZN84s' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, D9fIhtzgI70fuFLfL8.cs | High entropy of concatenated method names: 'UJ4ilxbfNo', 'v6YipWwTKI', 'dIqiqGfbf5', 'IvMihj75aU', 'W1Bie6rgXs', 'HmSin84mgV', 'f9AiQxweq4', 'vIVirkAcEW', 'aijiYE8CSP', 'AWvi1XRxQR' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, JqfdkMd0ddEo7nCNGc.cs | High entropy of concatenated method names: 'ReLFBZWsIW', 'kjNFbN0ZCu', 'tRK76TZni3', 'Ifs7nVV66h', 'r4G7QGvEvO', 'HjA7HUKq2H', 'TAa7xeXT8Z', 'RZR7N4ud5F', 'yaR7vlAPDT', 'F117SIj26y' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, Xcvjh2qGxiEDr0S8vo.cs | High entropy of concatenated method names: 'IUW72xd9Uj', 'ivM7lRxutY', 'CZh7ph1X4N', 'i6f7qAiFxv', 'vnQ746FYok', 'Q0f7f8wLRh', 'lFX7U5fsXr', 'kKX7jpNWnQ', 'hcG7GvbnWa', 'Mft7i9ZnF9' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, oWqsALsW1iwXN1h3kju.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HluZG81wAQ', 'JfZZi2UUTl', 'JLdZMxFH25', 'ma7ZZKOKso', 'OeqZPp96Is', 'PsgZ0JNqOQ', 'gWvZrPjGiW' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, DxAo2jOv4eQMN8950u.cs | High entropy of concatenated method names: 'LvEU3jvRfy', 'I9SUEXdxYO', 'QVajwrf9Un', 'EDkjsEQR77', 't4mUmPLAiL', 'nKjURPxkPk', 'jcoUCZ2SPU', 'S5tULm2Dmn', 'Q8nU8kiD3s', 'bD0UcpPVCI' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, cHCrHP7pHPpQHmwNll.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Q6egI7qio2', 'DDOgEujtMV', 'f3IgzkK6LJ', 'hSMKw0hvRj', 'kMuKsuc6xh', 'd9XKgevibc', 'pcvKKLLZrA', 'y4SL4pNJUfERROE0Eso' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, c7HHP8tld33bUMM6HI.cs | High entropy of concatenated method names: 'Dispose', 'iLAsILSqXB', 'b51gepU8RB', 'cJu7pLcNv6', 'AiBsEu7P8r', 'f4MszrhBZd', 'ProcessDialogKey', 'tungwH4ota', 'WRlgsJOKv3', 'VO2ggb7kjX' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, IH4otaIoRlJOKv3OO2.cs | High entropy of concatenated method names: 'bqbGhCxYpb', 'R9VGeyFgsu', 'FDJG63dPBj', 'DZ7Gn35pUt', 'ByOGQ8X2Zk', 'nOnGHuKcsh', 'mo9Gx6X1FD', 'IuaGNdvpc8', 'KoXGvOawAf', 'LJ8GSpjOSv' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, LRRNOAswi6QDbTcFmFG.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'C2xim88VxS', 'ysaiRk0X2d', 'yPxiCoZss2', 'lHEiLXgVUW', 'K4Pi8GHaj2', 'MuZick8hyl', 'nV6i5FV1JX' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, UwINc6WPeWx2cQLcGX.cs | High entropy of concatenated method names: 'dMosD0od1G', 'VNNs9lKZ74', 'AGxskiEDr0', 'N8vsJoQqfd', 'ICNs4Gclkn', 'yMQsfr7NFD', 'QvbD4e3XQGZ0dY5MS2', 'MCiZxFHodbeJNdcgrb', 'ROqssdWaPj', 'IWbsKfgnL9' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, PlaOlGx5mN833C3ruy.cs | High entropy of concatenated method names: 'uMDDuLugr7', 'NJqD7lgHvf', 'rVJDyxEtS8', 'uRtyEwoDOC', 'wj5yzo1nXP', 'zO8Dwpgsu3', 'sMeDsLTTD5', 'H6sDgsVx9q', 'ck0DKq40dS', 'kBiDWOVwWb' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, nXdkee5FZdtlC42u5A.cs | High entropy of concatenated method names: 'EcvUk3ICZA', 'AbkUJ4vcr5', 'ToString', 'zI7UuslB3N', 'oJAUtRQYLC', 'GFlU7Decus', 'UU7UFIw4Gr', 'TWFUyUQRwC', 'mMjUDXDZb7', 'PR9U9NVo96' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, GivQ3LLx62vMKmY2FE.cs | High entropy of concatenated method names: 'DjW4SiQV8q', 'Cfh4Raqkcf', 'tYV4LIDIQU', 'DXX48V9o4O', 'qEQ4e9edCo', 'dJc46DY3eE', 'yrF4noh3cj', 'nL34QwlLou', 'oQP4HAmSlJ', 'coy4x1BTZa' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, wnc5bH9fX7sv7Za8LK.cs | High entropy of concatenated method names: 'PWjKTrSW51', 'lbaKus9gkL', 'BsdKtFlqL5', 'zwOK7oIOPC', 'yNFKFXmyxs', 'YC8KyTj51L', 'owKKDVVuiO', 'vc9K91KvRO', 'Pi3KaIKjor', 'ExVKk1YByn' |
Source: 0.2.Payment Advice.exe.3fa9c98.4.raw.unpack, Bkn1MQhr7NFDffWBKY.cs | High entropy of concatenated method names: 'yyXyTmQdfj', 'CHUytQZZ6F', 'gRvyFBmVIs', 'PmPyDbsAG5', 's2Fy9At8Ur', 'Xu6FAhSNk7', 'UavFOTXZ57', 'tRlFowAO3D', 'IXOF3iphBM', 'T13FIGyYik' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, u24XxM8uRIoTpav9E2.cs | High entropy of concatenated method names: 'Ios4oGXpVE', 'JaS43scBeL', 'TBt4IZVdnL', 'Nnk4EH0nCN', 'u77xs4dgjMve3awyxvI', 'O3tkUMdP1ohbgdHMHYI', 'nJx62sdojb8rgr5eyNK', 'QBh6ypdfVqfP5J2x7Rr' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, V0od1GpONNlKZ74lAd.cs | High entropy of concatenated method names: 'oS3tLhb6ui', 'wnSt81ZogZ', 'niytc7xIW5', 'PkZt5RaBEy', 'pW7tA9Ks8u', 'r5OtOeiP7L', 'i67toF6ibk', 'VhVt3sAdi3', 'lp2tI0WnR1', 'r4ltEeq9p8' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, cLBVf8vxft4stwplCk.cs | High entropy of concatenated method names: 'uElDYUnniX', 'qogD1XJsBH', 'tioDVn8w2Y', 'FH4D2lL56N', 'JJqDBE6415', 't9YDlYQY0r', 'FJTDb9UAn3', 'CVHDpbkaFi', 'JBVDqG6yfg', 'CjYDdZpFKD' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, V1TjnGssHvunMsGa5Eb.cs | High entropy of concatenated method names: 'F76iEa8fgP', 'ceFizyETVh', 'A3RMwjioeJ', 'YwyMsUdBrI', 'sF0MgwYuOY', 'YQUMKETxmp', 'Xb9MWXh4Hh', 'pHwMTEuCc3', 'lFRMuSQhnO', 'BmMMtN1dst' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, Tmqavsg8mMuu42rPYF.cs | High entropy of concatenated method names: 'gBEVYjiLK', 'vDp21M1HV', 'PPll7Bbmq', 'sfGbUrCKj', 'nw5qNo1PP', 'FE8dG5wEe', 'qikmx7lMJdk2CscBwb', 'DcWTOK2vGElA0VANfu', 'C2djIZ4UW', 'Nu4irNR9L' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, e0GJdvoX7FLALSqXBB.cs | High entropy of concatenated method names: 'Dd9G4GrfyS', 'N1QGUR1VYv', 'VEbGGPruDn', 'qSCGMqqJoK', 'jOFGPSBcJ7', 'HyvGrEnRVI', 'Dispose', 'VFtjuhdk7F', 'm37jtMfqL6', 'YDyj7SNKlk' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, D7kjX5E8wnBR9dmFol.cs | High entropy of concatenated method names: 'vRBi7GLes8', 'tCPiFW8OMc', 'aeuiyIphdE', 'FhOiDjfv2O', 'gmQiGTJa1Z', 'iDDi9Wkdwk', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, mLmW3OCpnpqE18nJXc.cs | High entropy of concatenated method names: 'TdlXpRo1yS', 'LKnXqqTky2', 'fmMXhJjOi7', 'xekXedIG9D', 'xahXnZt4yI', 'zp9XQ7URUX', 'J2UXxc0chi', 'yALXNNAHme', 'DVAXSfVHR9', 'CbpXmZN84s' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, D9fIhtzgI70fuFLfL8.cs | High entropy of concatenated method names: 'UJ4ilxbfNo', 'v6YipWwTKI', 'dIqiqGfbf5', 'IvMihj75aU', 'W1Bie6rgXs', 'HmSin84mgV', 'f9AiQxweq4', 'vIVirkAcEW', 'aijiYE8CSP', 'AWvi1XRxQR' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, JqfdkMd0ddEo7nCNGc.cs | High entropy of concatenated method names: 'ReLFBZWsIW', 'kjNFbN0ZCu', 'tRK76TZni3', 'Ifs7nVV66h', 'r4G7QGvEvO', 'HjA7HUKq2H', 'TAa7xeXT8Z', 'RZR7N4ud5F', 'yaR7vlAPDT', 'F117SIj26y' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, Xcvjh2qGxiEDr0S8vo.cs | High entropy of concatenated method names: 'IUW72xd9Uj', 'ivM7lRxutY', 'CZh7ph1X4N', 'i6f7qAiFxv', 'vnQ746FYok', 'Q0f7f8wLRh', 'lFX7U5fsXr', 'kKX7jpNWnQ', 'hcG7GvbnWa', 'Mft7i9ZnF9' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, oWqsALsW1iwXN1h3kju.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HluZG81wAQ', 'JfZZi2UUTl', 'JLdZMxFH25', 'ma7ZZKOKso', 'OeqZPp96Is', 'PsgZ0JNqOQ', 'gWvZrPjGiW' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, DxAo2jOv4eQMN8950u.cs | High entropy of concatenated method names: 'LvEU3jvRfy', 'I9SUEXdxYO', 'QVajwrf9Un', 'EDkjsEQR77', 't4mUmPLAiL', 'nKjURPxkPk', 'jcoUCZ2SPU', 'S5tULm2Dmn', 'Q8nU8kiD3s', 'bD0UcpPVCI' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, cHCrHP7pHPpQHmwNll.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Q6egI7qio2', 'DDOgEujtMV', 'f3IgzkK6LJ', 'hSMKw0hvRj', 'kMuKsuc6xh', 'd9XKgevibc', 'pcvKKLLZrA', 'y4SL4pNJUfERROE0Eso' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, c7HHP8tld33bUMM6HI.cs | High entropy of concatenated method names: 'Dispose', 'iLAsILSqXB', 'b51gepU8RB', 'cJu7pLcNv6', 'AiBsEu7P8r', 'f4MszrhBZd', 'ProcessDialogKey', 'tungwH4ota', 'WRlgsJOKv3', 'VO2ggb7kjX' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, IH4otaIoRlJOKv3OO2.cs | High entropy of concatenated method names: 'bqbGhCxYpb', 'R9VGeyFgsu', 'FDJG63dPBj', 'DZ7Gn35pUt', 'ByOGQ8X2Zk', 'nOnGHuKcsh', 'mo9Gx6X1FD', 'IuaGNdvpc8', 'KoXGvOawAf', 'LJ8GSpjOSv' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, LRRNOAswi6QDbTcFmFG.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'C2xim88VxS', 'ysaiRk0X2d', 'yPxiCoZss2', 'lHEiLXgVUW', 'K4Pi8GHaj2', 'MuZick8hyl', 'nV6i5FV1JX' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, UwINc6WPeWx2cQLcGX.cs | High entropy of concatenated method names: 'dMosD0od1G', 'VNNs9lKZ74', 'AGxskiEDr0', 'N8vsJoQqfd', 'ICNs4Gclkn', 'yMQsfr7NFD', 'QvbD4e3XQGZ0dY5MS2', 'MCiZxFHodbeJNdcgrb', 'ROqssdWaPj', 'IWbsKfgnL9' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, PlaOlGx5mN833C3ruy.cs | High entropy of concatenated method names: 'uMDDuLugr7', 'NJqD7lgHvf', 'rVJDyxEtS8', 'uRtyEwoDOC', 'wj5yzo1nXP', 'zO8Dwpgsu3', 'sMeDsLTTD5', 'H6sDgsVx9q', 'ck0DKq40dS', 'kBiDWOVwWb' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, nXdkee5FZdtlC42u5A.cs | High entropy of concatenated method names: 'EcvUk3ICZA', 'AbkUJ4vcr5', 'ToString', 'zI7UuslB3N', 'oJAUtRQYLC', 'GFlU7Decus', 'UU7UFIw4Gr', 'TWFUyUQRwC', 'mMjUDXDZb7', 'PR9U9NVo96' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, GivQ3LLx62vMKmY2FE.cs | High entropy of concatenated method names: 'DjW4SiQV8q', 'Cfh4Raqkcf', 'tYV4LIDIQU', 'DXX48V9o4O', 'qEQ4e9edCo', 'dJc46DY3eE', 'yrF4noh3cj', 'nL34QwlLou', 'oQP4HAmSlJ', 'coy4x1BTZa' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, wnc5bH9fX7sv7Za8LK.cs | High entropy of concatenated method names: 'PWjKTrSW51', 'lbaKus9gkL', 'BsdKtFlqL5', 'zwOK7oIOPC', 'yNFKFXmyxs', 'YC8KyTj51L', 'owKKDVVuiO', 'vc9K91KvRO', 'Pi3KaIKjor', 'ExVKk1YByn' |
Source: 0.2.Payment Advice.exe.78f0000.7.raw.unpack, Bkn1MQhr7NFDffWBKY.cs | High entropy of concatenated method names: 'yyXyTmQdfj', 'CHUytQZZ6F', 'gRvyFBmVIs', 'PmPyDbsAG5', 's2Fy9At8Ur', 'Xu6FAhSNk7', 'UavFOTXZ57', 'tRlFowAO3D', 'IXOF3iphBM', 'T13FIGyYik' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, u24XxM8uRIoTpav9E2.cs | High entropy of concatenated method names: 'Ios4oGXpVE', 'JaS43scBeL', 'TBt4IZVdnL', 'Nnk4EH0nCN', 'u77xs4dgjMve3awyxvI', 'O3tkUMdP1ohbgdHMHYI', 'nJx62sdojb8rgr5eyNK', 'QBh6ypdfVqfP5J2x7Rr' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, V0od1GpONNlKZ74lAd.cs | High entropy of concatenated method names: 'oS3tLhb6ui', 'wnSt81ZogZ', 'niytc7xIW5', 'PkZt5RaBEy', 'pW7tA9Ks8u', 'r5OtOeiP7L', 'i67toF6ibk', 'VhVt3sAdi3', 'lp2tI0WnR1', 'r4ltEeq9p8' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, cLBVf8vxft4stwplCk.cs | High entropy of concatenated method names: 'uElDYUnniX', 'qogD1XJsBH', 'tioDVn8w2Y', 'FH4D2lL56N', 'JJqDBE6415', 't9YDlYQY0r', 'FJTDb9UAn3', 'CVHDpbkaFi', 'JBVDqG6yfg', 'CjYDdZpFKD' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, V1TjnGssHvunMsGa5Eb.cs | High entropy of concatenated method names: 'F76iEa8fgP', 'ceFizyETVh', 'A3RMwjioeJ', 'YwyMsUdBrI', 'sF0MgwYuOY', 'YQUMKETxmp', 'Xb9MWXh4Hh', 'pHwMTEuCc3', 'lFRMuSQhnO', 'BmMMtN1dst' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, Tmqavsg8mMuu42rPYF.cs | High entropy of concatenated method names: 'gBEVYjiLK', 'vDp21M1HV', 'PPll7Bbmq', 'sfGbUrCKj', 'nw5qNo1PP', 'FE8dG5wEe', 'qikmx7lMJdk2CscBwb', 'DcWTOK2vGElA0VANfu', 'C2djIZ4UW', 'Nu4irNR9L' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, e0GJdvoX7FLALSqXBB.cs | High entropy of concatenated method names: 'Dd9G4GrfyS', 'N1QGUR1VYv', 'VEbGGPruDn', 'qSCGMqqJoK', 'jOFGPSBcJ7', 'HyvGrEnRVI', 'Dispose', 'VFtjuhdk7F', 'm37jtMfqL6', 'YDyj7SNKlk' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, D7kjX5E8wnBR9dmFol.cs | High entropy of concatenated method names: 'vRBi7GLes8', 'tCPiFW8OMc', 'aeuiyIphdE', 'FhOiDjfv2O', 'gmQiGTJa1Z', 'iDDi9Wkdwk', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, mLmW3OCpnpqE18nJXc.cs | High entropy of concatenated method names: 'TdlXpRo1yS', 'LKnXqqTky2', 'fmMXhJjOi7', 'xekXedIG9D', 'xahXnZt4yI', 'zp9XQ7URUX', 'J2UXxc0chi', 'yALXNNAHme', 'DVAXSfVHR9', 'CbpXmZN84s' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, D9fIhtzgI70fuFLfL8.cs | High entropy of concatenated method names: 'UJ4ilxbfNo', 'v6YipWwTKI', 'dIqiqGfbf5', 'IvMihj75aU', 'W1Bie6rgXs', 'HmSin84mgV', 'f9AiQxweq4', 'vIVirkAcEW', 'aijiYE8CSP', 'AWvi1XRxQR' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, JqfdkMd0ddEo7nCNGc.cs | High entropy of concatenated method names: 'ReLFBZWsIW', 'kjNFbN0ZCu', 'tRK76TZni3', 'Ifs7nVV66h', 'r4G7QGvEvO', 'HjA7HUKq2H', 'TAa7xeXT8Z', 'RZR7N4ud5F', 'yaR7vlAPDT', 'F117SIj26y' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, Xcvjh2qGxiEDr0S8vo.cs | High entropy of concatenated method names: 'IUW72xd9Uj', 'ivM7lRxutY', 'CZh7ph1X4N', 'i6f7qAiFxv', 'vnQ746FYok', 'Q0f7f8wLRh', 'lFX7U5fsXr', 'kKX7jpNWnQ', 'hcG7GvbnWa', 'Mft7i9ZnF9' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, oWqsALsW1iwXN1h3kju.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HluZG81wAQ', 'JfZZi2UUTl', 'JLdZMxFH25', 'ma7ZZKOKso', 'OeqZPp96Is', 'PsgZ0JNqOQ', 'gWvZrPjGiW' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, DxAo2jOv4eQMN8950u.cs | High entropy of concatenated method names: 'LvEU3jvRfy', 'I9SUEXdxYO', 'QVajwrf9Un', 'EDkjsEQR77', 't4mUmPLAiL', 'nKjURPxkPk', 'jcoUCZ2SPU', 'S5tULm2Dmn', 'Q8nU8kiD3s', 'bD0UcpPVCI' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, cHCrHP7pHPpQHmwNll.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Q6egI7qio2', 'DDOgEujtMV', 'f3IgzkK6LJ', 'hSMKw0hvRj', 'kMuKsuc6xh', 'd9XKgevibc', 'pcvKKLLZrA', 'y4SL4pNJUfERROE0Eso' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, c7HHP8tld33bUMM6HI.cs | High entropy of concatenated method names: 'Dispose', 'iLAsILSqXB', 'b51gepU8RB', 'cJu7pLcNv6', 'AiBsEu7P8r', 'f4MszrhBZd', 'ProcessDialogKey', 'tungwH4ota', 'WRlgsJOKv3', 'VO2ggb7kjX' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, IH4otaIoRlJOKv3OO2.cs | High entropy of concatenated method names: 'bqbGhCxYpb', 'R9VGeyFgsu', 'FDJG63dPBj', 'DZ7Gn35pUt', 'ByOGQ8X2Zk', 'nOnGHuKcsh', 'mo9Gx6X1FD', 'IuaGNdvpc8', 'KoXGvOawAf', 'LJ8GSpjOSv' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, LRRNOAswi6QDbTcFmFG.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'C2xim88VxS', 'ysaiRk0X2d', 'yPxiCoZss2', 'lHEiLXgVUW', 'K4Pi8GHaj2', 'MuZick8hyl', 'nV6i5FV1JX' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, UwINc6WPeWx2cQLcGX.cs | High entropy of concatenated method names: 'dMosD0od1G', 'VNNs9lKZ74', 'AGxskiEDr0', 'N8vsJoQqfd', 'ICNs4Gclkn', 'yMQsfr7NFD', 'QvbD4e3XQGZ0dY5MS2', 'MCiZxFHodbeJNdcgrb', 'ROqssdWaPj', 'IWbsKfgnL9' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, PlaOlGx5mN833C3ruy.cs | High entropy of concatenated method names: 'uMDDuLugr7', 'NJqD7lgHvf', 'rVJDyxEtS8', 'uRtyEwoDOC', 'wj5yzo1nXP', 'zO8Dwpgsu3', 'sMeDsLTTD5', 'H6sDgsVx9q', 'ck0DKq40dS', 'kBiDWOVwWb' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, nXdkee5FZdtlC42u5A.cs | High entropy of concatenated method names: 'EcvUk3ICZA', 'AbkUJ4vcr5', 'ToString', 'zI7UuslB3N', 'oJAUtRQYLC', 'GFlU7Decus', 'UU7UFIw4Gr', 'TWFUyUQRwC', 'mMjUDXDZb7', 'PR9U9NVo96' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, GivQ3LLx62vMKmY2FE.cs | High entropy of concatenated method names: 'DjW4SiQV8q', 'Cfh4Raqkcf', 'tYV4LIDIQU', 'DXX48V9o4O', 'qEQ4e9edCo', 'dJc46DY3eE', 'yrF4noh3cj', 'nL34QwlLou', 'oQP4HAmSlJ', 'coy4x1BTZa' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, wnc5bH9fX7sv7Za8LK.cs | High entropy of concatenated method names: 'PWjKTrSW51', 'lbaKus9gkL', 'BsdKtFlqL5', 'zwOK7oIOPC', 'yNFKFXmyxs', 'YC8KyTj51L', 'owKKDVVuiO', 'vc9K91KvRO', 'Pi3KaIKjor', 'ExVKk1YByn' |
Source: 0.2.Payment Advice.exe.3f4e878.3.raw.unpack, Bkn1MQhr7NFDffWBKY.cs | High entropy of concatenated method names: 'yyXyTmQdfj', 'CHUytQZZ6F', 'gRvyFBmVIs', 'PmPyDbsAG5', 's2Fy9At8Ur', 'Xu6FAhSNk7', 'UavFOTXZ57', 'tRlFowAO3D', 'IXOF3iphBM', 'T13FIGyYik' |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Users\user\Desktop\Payment Advice.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Users\user\Desktop\Payment Advice.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Advice.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |