Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: 6F9vhIKqe7.exe, 00000000.00000002.1443095881.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006CA4000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006C2C000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: 6F9vhIKqe7.exe, 00000000.00000002.1443095881.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006CA4000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006C2C000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdbSHA256}Lq source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdb source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.23.227.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.23.227.208 |
Source: unknown | TCP traffic detected without corresponding DNS query: 142.250.184.195 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.16.100.168 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.16.100.168 |
Source: unknown | TCP traffic detected without corresponding DNS query: 142.250.184.195 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.16.100.168 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.16.100.168 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: MSBuild.exe, 00000001.00000002.2566778564.0000000002E73000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2566778564.0000000002E58000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2566778564.0000000002D91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1416633460.00000000050F8000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006D1A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2566778564.0000000002E58000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2564411044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2566778564.0000000002D91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hosting |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2566778564.0000000002E58000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2566778564.0000000002D91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1416633460.00000000050F8000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006D1A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.2564411044.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://account.dyn.com/ |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_0178D170 | 0_2_0178D170 |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_031847EE | 0_2_031847EE |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_0318BA30 | 0_2_0318BA30 |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_03189C38 | 0_2_03189C38 |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_03183018 | 0_2_03183018 |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_0318C758 | 0_2_0318C758 |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_0318C768 | 0_2_0318C768 |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Code function: 0_2_03189C28 | 0_2_03189C28 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0148A0E8 | 1_2_0148A0E8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0148A548 | 1_2_0148A548 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0148D980 | 1_2_0148D980 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01484A80 | 1_2_01484A80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01489D6C | 1_2_01489D6C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_01483E68 | 1_2_01483E68 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_014841B0 | 1_2_014841B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0148197C | 1_2_0148197C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_066B12E0 | 1_2_066B12E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_066B3C30 | 1_2_066B3C30 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_066B3548 | 1_2_066B3548 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 1_2_0148DD30 | 1_2_0148DD30 |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1427657832.0000000005C30000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameOjgrxvup.dll" vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1443095881.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006CA4000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006C2C000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000032F9000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename924b0ba6-e74e-4c09-aebe-86b4db498070.exe4 vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1416633460.0000000004A5E000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameOjgrxvup.dll" vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1399328721.000000000140E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1416633460.0000000004FE9000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameOjgrxvup.dll" vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006D1A000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename924b0ba6-e74e-4c09-aebe-86b4db498070.exe4 vs 6F9vhIKqe7.exe |
Source: 6F9vhIKqe7.exe | Binary or memory string: OriginalFilenameVxgqk.exed" vs 6F9vhIKqe7.exe |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.6F9vhIKqe7.exe.6d30138.15.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, ITaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask' |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, TaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder' |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, Task.cs | Task registration methods: 'RegisterChanges', 'CreateTask' |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, TaskService.cs | Task registration methods: 'CreateFromToken' |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, ITaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask' |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, TaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder' |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, TaskFolder.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, TaskSecurity.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, TaskSecurity.cs | Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, TaskPrincipal.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, Task.cs | Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, TaskSecurity.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, TaskSecurity.cs | Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, TaskFolder.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, Task.cs | Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, User.cs | Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, TaskPrincipal.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, User.cs | Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: 6F9vhIKqe7.exe, 00000000.00000002.1443095881.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006CA4000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006C2C000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: 6F9vhIKqe7.exe, 00000000.00000002.1443095881.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006CA4000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006C2C000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdbSHA256}Lq source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdb source: 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1429390441.0000000005EA0000.00000004.08000000.00040000.00000000.sdmp, 6F9vhIKqe7.exe, 00000000.00000002.1432950815.0000000006B0D000.00000004.00000800.00020000.00000000.sdmp |
Source: 6F9vhIKqe7.exe, -.cs | .Net Code: _0001 System.Reflection.Assembly.Load(byte[]) |
Source: 6F9vhIKqe7.exe, -.cs | .Net Code: _0001 System.Reflection.Assembly.Load(byte[]) |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.6F9vhIKqe7.exe.6ca4408.13.raw.unpack, XmlSerializationHelper.cs | .Net Code: ReadObjectProperties |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.6F9vhIKqe7.exe.7ca0000.22.raw.unpack, XmlSerializationHelper.cs | .Net Code: ReadObjectProperties |
Source: 0.2.6F9vhIKqe7.exe.6abd0d8.20.raw.unpack, TypeModel.cs | .Net Code: TryDeserializeList |
Source: 0.2.6F9vhIKqe7.exe.6abd0d8.20.raw.unpack, ListDecorator.cs | .Net Code: Read |
Source: 0.2.6F9vhIKqe7.exe.6abd0d8.20.raw.unpack, TypeSerializer.cs | .Net Code: CreateInstance |
Source: 0.2.6F9vhIKqe7.exe.6abd0d8.20.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateInstance |
Source: 0.2.6F9vhIKqe7.exe.6abd0d8.20.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateIfNull |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.6a30498.16.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.69b0ca6.19.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.69b0ca6.19.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.3100000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.3100000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.6970c86.21.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.6a30498.16.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.6F9vhIKqe7.exe.6908a38.18.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1400567927.0000000003100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1432950815.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1432950815.00000000068A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 6F9vhIKqe7.exe PID: 8504, type: MEMORYSTR |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: MSBuild.exe, 00000001.00000002.2566778564.0000000002DC5000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: MSBuild.exe, 00000001.00000002.2564411044.0000000000402000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: vmware |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: q 1:en-CH:Microsoft|VMWare|Virtual |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware|VIRTUAL|A M I|Xen |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: q 1:en-CH:VMware|VIRTUAL|A M I|Xen |
Source: 6F9vhIKqe7.exe, 00000000.00000002.1401108257.00000000031D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Microsoft|VMWare|Virtual |
Source: MSBuild.exe, 00000001.00000002.2564411044.0000000000402000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: VMwareVBox |
Source: MSBuild.exe, 00000001.00000002.2564946004.00000000010FB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Queries volume information: C:\Users\user\Desktop\6F9vhIKqe7.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\6F9vhIKqe7.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |