Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded |
Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: svchost.exe, 00000006.00000002.2850458467.0000017E6D600000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/ |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567 |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe |
Source: edb.log.6.dr | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org?q= |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:506013%0D%0ADate%20a |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003255000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003250000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlB |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtabv20 |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: edb.log.6.dr | String found in binary or memory: https://g.live.com/odclientsettings/Prod.C: |
Source: svchost.exe, 00000006.00000003.1203129421.0000017E6D440000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C: |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gemini.google.com/app?q= |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003180000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003110000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003110000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003110000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.000000000313B000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003180000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/v20 |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003286000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003277000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003281000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lB |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_01623E0C | 0_2_01623E0C |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_01627390 | 0_2_01627390 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E91D770 | 0_2_0E91D770 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E911C90 | 0_2_0E911C90 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E915AC0 | 0_2_0E915AC0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E911C90 | 0_2_0E911C90 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E912910 | 0_2_0E912910 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E915AC0 | 0_2_0E915AC0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E929FB0 | 0_2_0E929FB0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 0_2_0E9222C8 | 0_2_0E9222C8 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147C147 | 5_2_0147C147 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_01475362 | 5_2_01475362 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147D278 | 5_2_0147D278 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147C468 | 5_2_0147C468 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147C738 | 5_2_0147C738 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147E988 | 5_2_0147E988 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_014769A0 | 5_2_014769A0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147CA08 | 5_2_0147CA08 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_01479DE0 | 5_2_01479DE0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147CCD8 | 5_2_0147CCD8 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_01476FC8 | 5_2_01476FC8 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147CFA9 | 5_2_0147CFA9 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147F631 | 5_2_0147F631 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147E97C | 5_2_0147E97C |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_014729EC | 5_2_014729EC |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_0147FA88 | 5_2_0147FA88 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_01473AA1 | 5_2_01473AA1 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_01473E09 | 5_2_01473E09 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C91E80 | 5_2_06C91E80 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9E6B0 | 5_2_06C9E6B0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C917A0 | 5_2_06C917A0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C99C18 | 5_2_06C99C18 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C99548 | 5_2_06C99548 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C90B30 | 5_2_06C90B30 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C95028 | 5_2_06C95028 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C92968 | 5_2_06C92968 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9E6AF | 5_2_06C9E6AF |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C91E70 | 5_2_06C91E70 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9DE00 | 5_2_06C9DE00 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9178F | 5_2_06C9178F |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9EF51 | 5_2_06C9EF51 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9EF60 | 5_2_06C9EF60 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9CC8F | 5_2_06C9CC8F |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9CCA0 | 5_2_06C9CCA0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9DDFF | 5_2_06C9DDFF |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9D540 | 5_2_06C9D540 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9D550 | 5_2_06C9D550 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9EAF8 | 5_2_06C9EAF8 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9E249 | 5_2_06C9E249 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9E258 | 5_2_06C9E258 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C98B90 | 5_2_06C98B90 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9F3A8 | 5_2_06C9F3A8 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C98BA0 | 5_2_06C98BA0 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9F3B8 | 5_2_06C9F3B8 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9EB08 | 5_2_06C9EB08 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C90B20 | 5_2_06C90B20 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9D0F8 | 5_2_06C9D0F8 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C90040 | 5_2_06C90040 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9F801 | 5_2_06C9F801 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C90006 | 5_2_06C90006 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C95018 | 5_2_06C95018 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9F810 | 5_2_06C9F810 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9D999 | 5_2_06C9D999 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Code function: 5_2_06C9D9A8 | 5_2_06C9D9A8 |
Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: fastprox.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: ncobjapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mpclient.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wmitomi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, Pr9NEjWPLjtjxwCTRTZ.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KknGZhPssi', 'UUqGvFwZHs', 'rYfGyFb623', 'n93GIq1A72', 'KctGcolUX2', 'VhIGJ02qgT', 'DqLGfkaKFX' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, ynfd59DTnk0P8IUUim.cs | High entropy of concatenated method names: 'X54Y1pc0G', 'tpvx1UyH0', 'AAi4JAUkp', 'fTBVZCwOB', 'WLhCVe6sg', 'A3fAS4YOY', 'MCUCwF8TJJfk98HXEC', 'LEVML925EIxHh4reXj', 'DvAFghZ5F', 'erIGCqNrl' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, OVbtgef29TOIYVcr1P.cs | High entropy of concatenated method names: 'mVJQ2FTMXV', 'CYTQT4RvWv', 'ToString', 'BblQapbXma', 'ND0QRS4PXv', 'nLSQKZmwI3', 'yW5Qn9BraN', 'tIlQ6A3ALO', 'jRKQjlpIAb', 'QFhQbuDiuH' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, hJig8h0WZikgbJwFOu.cs | High entropy of concatenated method names: 'xKLq9VeKRx', 'XpMquqvlqY', 'qyjqO7FWKI', 'LyVqmnd4pe', 'oXEqMOdKMQ', 'kJyqgNjxu8', 'yJUqXSDqXK', 'ntfqB2QA3j', 'PUIq8KtUFh', 'iDmqLZmB21' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, kedsymiHwR9IZl9Rpl.cs | High entropy of concatenated method names: 'TGoqw7NdG7', 'CygqQjoru6', 'JpiqqqymZj', 'cuCq3o6JRy', 'zDvql3CPql', 'Ux4qrwHry7', 'Dispose', 'cLEFaAxyOF', 'lH5FR3uRiC', 'qp1FKDgAne' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, QMS5wJSpvkKerolDJ1.cs | High entropy of concatenated method names: 'PGVQNMjm8W', 'zDNQpmVnAi', 'xfjFPuRPgU', 'jPLFWkXv4O', 'QRXQZtTHuq', 'kt1Qv2jqci', 'TNeQyqPMvE', 'oBaQIUqFJJ', 'xenQc4FcQC', 'L1SQJsYKga' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, rtUpFMWDBEDy9V0EA9v.cs | High entropy of concatenated method names: 'ToString', 'mMh3kZlNEo', 'daQ3C02ZFW', 'UPN3AJO2nj', 'Sni39vN8Gn', 'egP3uvUdJC', 'RI53OPvJCI', 'utG3mNO2D4', 'QFXNFRWUPPhW8yi5Nea', 'od4TV4WH96xh1EIeVAK' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, QS84t6WHerZ6peZei3s.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MxWoqG79nY', 'pFUoGwsB4t', 'OcQo3x2LGL', 'tLsooO2OSU', 'tVmolNyx39', 'DrgosTm46X', 'HK6or54Jnn' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, oG17jiWWq4NBFriJ2sN.cs | High entropy of concatenated method names: 'IsOGpFnI4x', 'G22GzUyb7B', 'QYW3P5CgwI', 'QJh3WiTc30', 'q5h3DeNXqA', 'A3k37u005t', 'XFq3H4nyLM', 'gBs3toLdWq', 'ub53aUlVpX', 'UHO3R1t6kI' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, iCyBrjAQ0K85ZxmtDg.cs | High entropy of concatenated method names: 'wCpndiiBJ4', 'N4unViW4AK', 'y96KOoCbOs', 'CO9KmUR7cl', 'ME1KMqZnZ4', 'YclKgGhLLU', 'UbcKXrh8dH', 'vNuKBjdKEa', 'MU0K8avwpJ', 'aQ9KLCPQpX' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, dynp2dHAyXLHRUbXBm.cs | High entropy of concatenated method names: 'NlXWjnVnXi', 'x7pWbD1OyD', 'E6YW25jjqc', 'jxvWTG6CyB', 'AmtWwDgTAV', 'hg6W1YPviX', 'LrJO9qUhSMlf9uojpL', 'RWbL0vH3Rjcc24eaNR', 'zxqWWAwbno', 'QlUW7uPPkx' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, CiqvKlplBI3tKjcx8Y.cs | High entropy of concatenated method names: 'hKHGKFanLs', 'xuRGnTxm4O', 'EATG6bCknV', 'lFNGj06W8d', 'HLtGqhCBgp', 'ETaGbsDlmS', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, RYr6Dnb8cId14miXvc.cs | High entropy of concatenated method names: 'yDK7tqICGy', 'MZy7afHjIe', 'KQB7RKHOLZ', 'FRu7KnRmTZ', 'xfy7njfXsi', 'JLc76mtbCi', 'jwC7jen05i', 'JqN7beNc4P', 'raD75MWCph', 'QZX72IgiBW' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, mgDE1gRRmkiAifKFan.cs | High entropy of concatenated method names: 'Dispose', 'g9IW0Zl9Rp', 'HnCDuuhGpF', 'BOYXJTntj5', 'u54Wp0vphN', 'cV9WzHHht1', 'ProcessDialogKey', 'P5KDPJig8h', 'bZiDWkgbJw', 'rOuDD4iqvK' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, bPA6G0Kn1bOXlAplBO.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z9sD0KHo5P', 'WsqDpo5BcS', 'LaRDzYIcHL', 'NV87PCoist', 'JN47WO1yv6', 'JRc7DoFQLW', 'NtO77kZOnS', 'ThnTqdLwZlGKdnoIuXR' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, LuU7TjJm9sXp1wJX8A.cs | High entropy of concatenated method names: 'ToString', 'y6l1ZqN899', 'wxl1u15tbT', 'Itf1OGuUSf', 'XBu1mfFo1K', 'Qlk1Mp6NEW', 'P8n1gqhXhq', 'tjJ1X5ZHth', 'vjN1BeHSgS', 'Y0G18CNvst' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, xBHHG6XsKDbNNLtgdy.cs | High entropy of concatenated method names: 'IY9jatkoX3', 'odJjKWW5Lg', 'jV5j6e1cCI', 'Q2S6pgEb9y', 'jbZ6zjmY6Z', 'CfrjPtiW6R', 'EZ6jWxn3NX', 'yDsjD7LEC6', 'IS2j7QStgF', 'XjCjHRYnqu' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, LnVnXikr7pD1OyDJ5H.cs | High entropy of concatenated method names: 'ON4RInxt91', 'jJsRc0nkMb', 'ApwRJ39qfS', 'U5eRf5PSQV', 'PFPReOlp6S', 'hdIRSyE7rh', 'hYDRi0iLUy', 'F8YRNMGitG', 'xG3R0DKa43', 'u8wRpysyKE' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, tsKFQRyS8x1tRqYrqR.cs | High entropy of concatenated method names: 'p7sEkerBwW', 'I19EC4ZAkx', 'hOSE9falXf', 'rZyEuOvAyx', 'c8XEmIQILl', 'Fm1EM1kOKf', 'SfTEX4N8xn', 'VPUEB5EYtN', 'wTCELe0IkX', 'h7LEZCOBCV' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, Rnlu3s8n8UKbY8UFJb.cs | High entropy of concatenated method names: 'pB2jh9voWO', 'hQejUt8O5j', 'eyfjYSEPGv', 's3hjxGwwZl', 'WK9jd1eB6H', 'eZXj4833YJ', 'pYHjVIj5Ht', 'JBIjk1bAGd', 'YJJjCNqWrc', 'AfCjAf9prE' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, uvatpAIBg4sIxQSbeU.cs | High entropy of concatenated method names: 'YLmwL6nIF1', 'ThgwvYmiVE', 'DCewII4v9O', 'S6swcgD2wI', 'J66wugNMXv', 'GnvwOnh33g', 'tRZwmuRfoD', 'otVwMNrqDw', 'u7hwg5sWGy', 'rZswXW1jZ2' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, geRufZzvwFwWKwr4Qj.cs | High entropy of concatenated method names: 'UUVG4t1bQd', 'hgDGkSgDwM', 'XXuGCiw1gc', 'kayG95e0ma', 'AOKGuglo1H', 'CddGm7oGc1', 'r5MGM2UIDL', 'ncdGrcR66p', 'QvRGhM6e39', 'ocaGUfcWtl' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, XBqFKCC6Y5jjqc6xvG.cs | High entropy of concatenated method names: 'RmVKxAprnF', 'XdJK4Cf7jp', 'tGqKktiP7i', 'XMMKClaRQn', 'rU0Kw8Fe46', 'gK5K1t02Cr', 'mp8KQnVkT9', 'oCYKFJbdgi', 'iK4KqrrSMZ', 'v74KGNwL83' |
Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, nAVng69YPviXSp80Uh.cs | High entropy of concatenated method names: 'ILq6tWNH5v', 'JOu6RNiwBx', 'UqE6nomfis', 'qWr6jYLjao', 'jpF6b5lHHR', 'p27ne7RSUc', 'H9NnSgLs63', 'HipniOUEvZ', 'lAgnNDsbSH', 'dCUn0ULXuu' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, Pr9NEjWPLjtjxwCTRTZ.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KknGZhPssi', 'UUqGvFwZHs', 'rYfGyFb623', 'n93GIq1A72', 'KctGcolUX2', 'VhIGJ02qgT', 'DqLGfkaKFX' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, ynfd59DTnk0P8IUUim.cs | High entropy of concatenated method names: 'X54Y1pc0G', 'tpvx1UyH0', 'AAi4JAUkp', 'fTBVZCwOB', 'WLhCVe6sg', 'A3fAS4YOY', 'MCUCwF8TJJfk98HXEC', 'LEVML925EIxHh4reXj', 'DvAFghZ5F', 'erIGCqNrl' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, OVbtgef29TOIYVcr1P.cs | High entropy of concatenated method names: 'mVJQ2FTMXV', 'CYTQT4RvWv', 'ToString', 'BblQapbXma', 'ND0QRS4PXv', 'nLSQKZmwI3', 'yW5Qn9BraN', 'tIlQ6A3ALO', 'jRKQjlpIAb', 'QFhQbuDiuH' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, hJig8h0WZikgbJwFOu.cs | High entropy of concatenated method names: 'xKLq9VeKRx', 'XpMquqvlqY', 'qyjqO7FWKI', 'LyVqmnd4pe', 'oXEqMOdKMQ', 'kJyqgNjxu8', 'yJUqXSDqXK', 'ntfqB2QA3j', 'PUIq8KtUFh', 'iDmqLZmB21' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, kedsymiHwR9IZl9Rpl.cs | High entropy of concatenated method names: 'TGoqw7NdG7', 'CygqQjoru6', 'JpiqqqymZj', 'cuCq3o6JRy', 'zDvql3CPql', 'Ux4qrwHry7', 'Dispose', 'cLEFaAxyOF', 'lH5FR3uRiC', 'qp1FKDgAne' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, QMS5wJSpvkKerolDJ1.cs | High entropy of concatenated method names: 'PGVQNMjm8W', 'zDNQpmVnAi', 'xfjFPuRPgU', 'jPLFWkXv4O', 'QRXQZtTHuq', 'kt1Qv2jqci', 'TNeQyqPMvE', 'oBaQIUqFJJ', 'xenQc4FcQC', 'L1SQJsYKga' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, rtUpFMWDBEDy9V0EA9v.cs | High entropy of concatenated method names: 'ToString', 'mMh3kZlNEo', 'daQ3C02ZFW', 'UPN3AJO2nj', 'Sni39vN8Gn', 'egP3uvUdJC', 'RI53OPvJCI', 'utG3mNO2D4', 'QFXNFRWUPPhW8yi5Nea', 'od4TV4WH96xh1EIeVAK' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, QS84t6WHerZ6peZei3s.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MxWoqG79nY', 'pFUoGwsB4t', 'OcQo3x2LGL', 'tLsooO2OSU', 'tVmolNyx39', 'DrgosTm46X', 'HK6or54Jnn' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, oG17jiWWq4NBFriJ2sN.cs | High entropy of concatenated method names: 'IsOGpFnI4x', 'G22GzUyb7B', 'QYW3P5CgwI', 'QJh3WiTc30', 'q5h3DeNXqA', 'A3k37u005t', 'XFq3H4nyLM', 'gBs3toLdWq', 'ub53aUlVpX', 'UHO3R1t6kI' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, iCyBrjAQ0K85ZxmtDg.cs | High entropy of concatenated method names: 'wCpndiiBJ4', 'N4unViW4AK', 'y96KOoCbOs', 'CO9KmUR7cl', 'ME1KMqZnZ4', 'YclKgGhLLU', 'UbcKXrh8dH', 'vNuKBjdKEa', 'MU0K8avwpJ', 'aQ9KLCPQpX' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, dynp2dHAyXLHRUbXBm.cs | High entropy of concatenated method names: 'NlXWjnVnXi', 'x7pWbD1OyD', 'E6YW25jjqc', 'jxvWTG6CyB', 'AmtWwDgTAV', 'hg6W1YPviX', 'LrJO9qUhSMlf9uojpL', 'RWbL0vH3Rjcc24eaNR', 'zxqWWAwbno', 'QlUW7uPPkx' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, CiqvKlplBI3tKjcx8Y.cs | High entropy of concatenated method names: 'hKHGKFanLs', 'xuRGnTxm4O', 'EATG6bCknV', 'lFNGj06W8d', 'HLtGqhCBgp', 'ETaGbsDlmS', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, RYr6Dnb8cId14miXvc.cs | High entropy of concatenated method names: 'yDK7tqICGy', 'MZy7afHjIe', 'KQB7RKHOLZ', 'FRu7KnRmTZ', 'xfy7njfXsi', 'JLc76mtbCi', 'jwC7jen05i', 'JqN7beNc4P', 'raD75MWCph', 'QZX72IgiBW' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, mgDE1gRRmkiAifKFan.cs | High entropy of concatenated method names: 'Dispose', 'g9IW0Zl9Rp', 'HnCDuuhGpF', 'BOYXJTntj5', 'u54Wp0vphN', 'cV9WzHHht1', 'ProcessDialogKey', 'P5KDPJig8h', 'bZiDWkgbJw', 'rOuDD4iqvK' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, bPA6G0Kn1bOXlAplBO.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z9sD0KHo5P', 'WsqDpo5BcS', 'LaRDzYIcHL', 'NV87PCoist', 'JN47WO1yv6', 'JRc7DoFQLW', 'NtO77kZOnS', 'ThnTqdLwZlGKdnoIuXR' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, LuU7TjJm9sXp1wJX8A.cs | High entropy of concatenated method names: 'ToString', 'y6l1ZqN899', 'wxl1u15tbT', 'Itf1OGuUSf', 'XBu1mfFo1K', 'Qlk1Mp6NEW', 'P8n1gqhXhq', 'tjJ1X5ZHth', 'vjN1BeHSgS', 'Y0G18CNvst' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, xBHHG6XsKDbNNLtgdy.cs | High entropy of concatenated method names: 'IY9jatkoX3', 'odJjKWW5Lg', 'jV5j6e1cCI', 'Q2S6pgEb9y', 'jbZ6zjmY6Z', 'CfrjPtiW6R', 'EZ6jWxn3NX', 'yDsjD7LEC6', 'IS2j7QStgF', 'XjCjHRYnqu' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, LnVnXikr7pD1OyDJ5H.cs | High entropy of concatenated method names: 'ON4RInxt91', 'jJsRc0nkMb', 'ApwRJ39qfS', 'U5eRf5PSQV', 'PFPReOlp6S', 'hdIRSyE7rh', 'hYDRi0iLUy', 'F8YRNMGitG', 'xG3R0DKa43', 'u8wRpysyKE' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, tsKFQRyS8x1tRqYrqR.cs | High entropy of concatenated method names: 'p7sEkerBwW', 'I19EC4ZAkx', 'hOSE9falXf', 'rZyEuOvAyx', 'c8XEmIQILl', 'Fm1EM1kOKf', 'SfTEX4N8xn', 'VPUEB5EYtN', 'wTCELe0IkX', 'h7LEZCOBCV' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, Rnlu3s8n8UKbY8UFJb.cs | High entropy of concatenated method names: 'pB2jh9voWO', 'hQejUt8O5j', 'eyfjYSEPGv', 's3hjxGwwZl', 'WK9jd1eB6H', 'eZXj4833YJ', 'pYHjVIj5Ht', 'JBIjk1bAGd', 'YJJjCNqWrc', 'AfCjAf9prE' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, uvatpAIBg4sIxQSbeU.cs | High entropy of concatenated method names: 'YLmwL6nIF1', 'ThgwvYmiVE', 'DCewII4v9O', 'S6swcgD2wI', 'J66wugNMXv', 'GnvwOnh33g', 'tRZwmuRfoD', 'otVwMNrqDw', 'u7hwg5sWGy', 'rZswXW1jZ2' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, geRufZzvwFwWKwr4Qj.cs | High entropy of concatenated method names: 'UUVG4t1bQd', 'hgDGkSgDwM', 'XXuGCiw1gc', 'kayG95e0ma', 'AOKGuglo1H', 'CddGm7oGc1', 'r5MGM2UIDL', 'ncdGrcR66p', 'QvRGhM6e39', 'ocaGUfcWtl' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, XBqFKCC6Y5jjqc6xvG.cs | High entropy of concatenated method names: 'RmVKxAprnF', 'XdJK4Cf7jp', 'tGqKktiP7i', 'XMMKClaRQn', 'rU0Kw8Fe46', 'gK5K1t02Cr', 'mp8KQnVkT9', 'oCYKFJbdgi', 'iK4KqrrSMZ', 'v74KGNwL83' |
Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, nAVng69YPviXSp80Uh.cs | High entropy of concatenated method names: 'ILq6tWNH5v', 'JOu6RNiwBx', 'UqE6nomfis', 'qWr6jYLjao', 'jpF6b5lHHR', 'p27ne7RSUc', 'H9NnSgLs63', 'HipniOUEvZ', 'lAgnNDsbSH', 'dCUn0ULXuu' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, Pr9NEjWPLjtjxwCTRTZ.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KknGZhPssi', 'UUqGvFwZHs', 'rYfGyFb623', 'n93GIq1A72', 'KctGcolUX2', 'VhIGJ02qgT', 'DqLGfkaKFX' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, ynfd59DTnk0P8IUUim.cs | High entropy of concatenated method names: 'X54Y1pc0G', 'tpvx1UyH0', 'AAi4JAUkp', 'fTBVZCwOB', 'WLhCVe6sg', 'A3fAS4YOY', 'MCUCwF8TJJfk98HXEC', 'LEVML925EIxHh4reXj', 'DvAFghZ5F', 'erIGCqNrl' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, OVbtgef29TOIYVcr1P.cs | High entropy of concatenated method names: 'mVJQ2FTMXV', 'CYTQT4RvWv', 'ToString', 'BblQapbXma', 'ND0QRS4PXv', 'nLSQKZmwI3', 'yW5Qn9BraN', 'tIlQ6A3ALO', 'jRKQjlpIAb', 'QFhQbuDiuH' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, hJig8h0WZikgbJwFOu.cs | High entropy of concatenated method names: 'xKLq9VeKRx', 'XpMquqvlqY', 'qyjqO7FWKI', 'LyVqmnd4pe', 'oXEqMOdKMQ', 'kJyqgNjxu8', 'yJUqXSDqXK', 'ntfqB2QA3j', 'PUIq8KtUFh', 'iDmqLZmB21' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, kedsymiHwR9IZl9Rpl.cs | High entropy of concatenated method names: 'TGoqw7NdG7', 'CygqQjoru6', 'JpiqqqymZj', 'cuCq3o6JRy', 'zDvql3CPql', 'Ux4qrwHry7', 'Dispose', 'cLEFaAxyOF', 'lH5FR3uRiC', 'qp1FKDgAne' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, QMS5wJSpvkKerolDJ1.cs | High entropy of concatenated method names: 'PGVQNMjm8W', 'zDNQpmVnAi', 'xfjFPuRPgU', 'jPLFWkXv4O', 'QRXQZtTHuq', 'kt1Qv2jqci', 'TNeQyqPMvE', 'oBaQIUqFJJ', 'xenQc4FcQC', 'L1SQJsYKga' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, rtUpFMWDBEDy9V0EA9v.cs | High entropy of concatenated method names: 'ToString', 'mMh3kZlNEo', 'daQ3C02ZFW', 'UPN3AJO2nj', 'Sni39vN8Gn', 'egP3uvUdJC', 'RI53OPvJCI', 'utG3mNO2D4', 'QFXNFRWUPPhW8yi5Nea', 'od4TV4WH96xh1EIeVAK' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, QS84t6WHerZ6peZei3s.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MxWoqG79nY', 'pFUoGwsB4t', 'OcQo3x2LGL', 'tLsooO2OSU', 'tVmolNyx39', 'DrgosTm46X', 'HK6or54Jnn' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, oG17jiWWq4NBFriJ2sN.cs | High entropy of concatenated method names: 'IsOGpFnI4x', 'G22GzUyb7B', 'QYW3P5CgwI', 'QJh3WiTc30', 'q5h3DeNXqA', 'A3k37u005t', 'XFq3H4nyLM', 'gBs3toLdWq', 'ub53aUlVpX', 'UHO3R1t6kI' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, iCyBrjAQ0K85ZxmtDg.cs | High entropy of concatenated method names: 'wCpndiiBJ4', 'N4unViW4AK', 'y96KOoCbOs', 'CO9KmUR7cl', 'ME1KMqZnZ4', 'YclKgGhLLU', 'UbcKXrh8dH', 'vNuKBjdKEa', 'MU0K8avwpJ', 'aQ9KLCPQpX' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, dynp2dHAyXLHRUbXBm.cs | High entropy of concatenated method names: 'NlXWjnVnXi', 'x7pWbD1OyD', 'E6YW25jjqc', 'jxvWTG6CyB', 'AmtWwDgTAV', 'hg6W1YPviX', 'LrJO9qUhSMlf9uojpL', 'RWbL0vH3Rjcc24eaNR', 'zxqWWAwbno', 'QlUW7uPPkx' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, CiqvKlplBI3tKjcx8Y.cs | High entropy of concatenated method names: 'hKHGKFanLs', 'xuRGnTxm4O', 'EATG6bCknV', 'lFNGj06W8d', 'HLtGqhCBgp', 'ETaGbsDlmS', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, RYr6Dnb8cId14miXvc.cs | High entropy of concatenated method names: 'yDK7tqICGy', 'MZy7afHjIe', 'KQB7RKHOLZ', 'FRu7KnRmTZ', 'xfy7njfXsi', 'JLc76mtbCi', 'jwC7jen05i', 'JqN7beNc4P', 'raD75MWCph', 'QZX72IgiBW' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, mgDE1gRRmkiAifKFan.cs | High entropy of concatenated method names: 'Dispose', 'g9IW0Zl9Rp', 'HnCDuuhGpF', 'BOYXJTntj5', 'u54Wp0vphN', 'cV9WzHHht1', 'ProcessDialogKey', 'P5KDPJig8h', 'bZiDWkgbJw', 'rOuDD4iqvK' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, bPA6G0Kn1bOXlAplBO.cs | High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z9sD0KHo5P', 'WsqDpo5BcS', 'LaRDzYIcHL', 'NV87PCoist', 'JN47WO1yv6', 'JRc7DoFQLW', 'NtO77kZOnS', 'ThnTqdLwZlGKdnoIuXR' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, LuU7TjJm9sXp1wJX8A.cs | High entropy of concatenated method names: 'ToString', 'y6l1ZqN899', 'wxl1u15tbT', 'Itf1OGuUSf', 'XBu1mfFo1K', 'Qlk1Mp6NEW', 'P8n1gqhXhq', 'tjJ1X5ZHth', 'vjN1BeHSgS', 'Y0G18CNvst' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, xBHHG6XsKDbNNLtgdy.cs | High entropy of concatenated method names: 'IY9jatkoX3', 'odJjKWW5Lg', 'jV5j6e1cCI', 'Q2S6pgEb9y', 'jbZ6zjmY6Z', 'CfrjPtiW6R', 'EZ6jWxn3NX', 'yDsjD7LEC6', 'IS2j7QStgF', 'XjCjHRYnqu' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, LnVnXikr7pD1OyDJ5H.cs | High entropy of concatenated method names: 'ON4RInxt91', 'jJsRc0nkMb', 'ApwRJ39qfS', 'U5eRf5PSQV', 'PFPReOlp6S', 'hdIRSyE7rh', 'hYDRi0iLUy', 'F8YRNMGitG', 'xG3R0DKa43', 'u8wRpysyKE' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, tsKFQRyS8x1tRqYrqR.cs | High entropy of concatenated method names: 'p7sEkerBwW', 'I19EC4ZAkx', 'hOSE9falXf', 'rZyEuOvAyx', 'c8XEmIQILl', 'Fm1EM1kOKf', 'SfTEX4N8xn', 'VPUEB5EYtN', 'wTCELe0IkX', 'h7LEZCOBCV' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, Rnlu3s8n8UKbY8UFJb.cs | High entropy of concatenated method names: 'pB2jh9voWO', 'hQejUt8O5j', 'eyfjYSEPGv', 's3hjxGwwZl', 'WK9jd1eB6H', 'eZXj4833YJ', 'pYHjVIj5Ht', 'JBIjk1bAGd', 'YJJjCNqWrc', 'AfCjAf9prE' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, uvatpAIBg4sIxQSbeU.cs | High entropy of concatenated method names: 'YLmwL6nIF1', 'ThgwvYmiVE', 'DCewII4v9O', 'S6swcgD2wI', 'J66wugNMXv', 'GnvwOnh33g', 'tRZwmuRfoD', 'otVwMNrqDw', 'u7hwg5sWGy', 'rZswXW1jZ2' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, geRufZzvwFwWKwr4Qj.cs | High entropy of concatenated method names: 'UUVG4t1bQd', 'hgDGkSgDwM', 'XXuGCiw1gc', 'kayG95e0ma', 'AOKGuglo1H', 'CddGm7oGc1', 'r5MGM2UIDL', 'ncdGrcR66p', 'QvRGhM6e39', 'ocaGUfcWtl' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, XBqFKCC6Y5jjqc6xvG.cs | High entropy of concatenated method names: 'RmVKxAprnF', 'XdJK4Cf7jp', 'tGqKktiP7i', 'XMMKClaRQn', 'rU0Kw8Fe46', 'gK5K1t02Cr', 'mp8KQnVkT9', 'oCYKFJbdgi', 'iK4KqrrSMZ', 'v74KGNwL83' |
Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, nAVng69YPviXSp80Uh.cs | High entropy of concatenated method names: 'ILq6tWNH5v', 'JOu6RNiwBx', 'UqE6nomfis', 'qWr6jYLjao', 'jpF6b5lHHR', 'p27ne7RSUc', 'H9NnSgLs63', 'HipniOUEvZ', 'lAgnNDsbSH', 'dCUn0ULXuu' |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599781 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599672 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599547 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599435 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599218 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599109 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598998 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598890 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598781 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598670 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598343 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598234 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598125 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598015 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597906 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597796 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597687 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597578 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597468 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597359 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597250 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597140 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597031 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596921 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596812 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596703 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596593 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596484 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596374 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596265 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596156 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596047 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595937 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595828 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595718 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595609 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595499 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595390 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595280 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595171 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595059 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594950 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594843 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594734 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594624 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594515 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6792 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1092 | Thread sleep time: -5534023222112862s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep count: 36 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -33204139332677172s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6892 | Thread sleep count: 1884 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6892 | Thread sleep count: 7970 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599547s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599435s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599328s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599218s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -599109s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598998s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598670s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598234s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598125s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -598015s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597906s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597796s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597687s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597578s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597468s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597359s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597250s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597140s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -597031s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596921s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596812s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596703s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596593s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596484s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596374s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596265s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596156s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -596047s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595937s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595828s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595718s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595609s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595499s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595390s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595280s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595171s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -595059s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -594950s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -594843s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -594734s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -594624s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852 | Thread sleep time: -594515s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 1456 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6768 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599781 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599672 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599547 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599435 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599328 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599218 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 599109 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598998 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598890 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598781 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598670 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598453 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598343 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598234 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598125 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 598015 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597906 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597796 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597687 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597578 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597468 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597359 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597250 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597140 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 597031 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596921 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596812 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596703 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596593 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596484 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596374 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596265 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596156 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 596047 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595937 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595828 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595718 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595609 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595499 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595390 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595280 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595171 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 595059 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594950 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594843 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594734 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594624 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Thread delayed: delay time: 594515 | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Users\user\Desktop\3GrfjMY0pG.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Users\user\Desktop\3GrfjMY0pG.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\3GrfjMY0pG.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |