Source: Yara match | File source: 00000001.00000003.256391055.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.271836346.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.273042798.0000000005600000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.264680432.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.241218830.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.274094919.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.249106511.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.278071397.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.280784608.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.239659598.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.256935911.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.246159593.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.259153527.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.285574850.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277117984.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.271241687.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277595306.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.265198501.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.243381131.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.257858971.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277067431.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.259320782.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.291234965.0000000004C7B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.256197292.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.264809143.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.265443740.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.236505260.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.236486892.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.253923836.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.255526106.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.295428205.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.294995918.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277431781.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.273748481.0000000005600000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.274846566.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.237144928.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.251212605.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.264154370.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.238710461.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.288236043.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.245613044.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.257935061.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.278897772.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.293189263.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.267370759.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.254994601.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.240173246.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.274456133.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.304981377.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.270300423.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.286367767.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.269530971.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.263667539.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.258161115.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.289850906.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.300629725.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.272916779.0000000005600000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.305329732.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.270200898.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.293787173.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.266558071.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.253671306.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.237389542.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.294617934.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.276276154.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.240262452.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.239883492.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.263872253.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.269137977.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.278685234.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.283560648.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.249688202.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.293940716.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.290424092.0000000004C7B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.283340912.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.262844027.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.259283734.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.238014797.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.271572456.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.256430089.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.258360856.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.288356135.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.275757453.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.238102860.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.240874333.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.273201979.0000000005600000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.244243849.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.267868691.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.269094798.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.254283817.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.275569270.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.241734772.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.278437674.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.272990796.0000000005600000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.232860696.0000000004C7D000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.260772294.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.272048354.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.267701094.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.274957702.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.266152517.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.279006664.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.284798276.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.273917646.0000000005600000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.247615394.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.257996273.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.261652206.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.274507818.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.261331732.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.281405397.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.283282754.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.265915429.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.269705439.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.275053165.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.255117642.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.292663447.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.291375757.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.241056750.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.290023557.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.237808058.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.278752961.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.280293835.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.236423394.0000000004C7D000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.236874963.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.302524542.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.247109477.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.275645069.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.280206009.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.278135737.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.240730923.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.293364472.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.265306552.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.265069037.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.239116374.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.279316481.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.302993593.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.242967068.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.283137568.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.275366477.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.253539368.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.247825321.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.245818641.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.241711373.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.238965909.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.246281224.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.245673986.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.275699440.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.265680740.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.272578748.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.289749651.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.238841689.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277677530.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.264457762.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.291089251.0000000004C7B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.244500544.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.292685822.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.278500716.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.249267064.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.236953582.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.258289655.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.263620413.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.239376251.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277317994.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.257574966.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.293128701.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.289880823.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.300785633.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277231069.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.236768091.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.246612662.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.280651645.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.273445243.0000000005600000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.291801736.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.245471047.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.243866179.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.266946380.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.253428183.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.272155347.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.281960602.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.253196946.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.259661460.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.268383242.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.240669318.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.300465803.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.260820501.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.236092077.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.240224782.0000000005479000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.276533372.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.281236726.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.281511356.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.244934097.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.270067455.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.246322680.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.303269378.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.277906747.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.264875600.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.240969302.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.245735454.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.294813449.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.263844095.0000000005602000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: Avaddon Ransomware.exe PID: 1984, type: MEMORY |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: Yara match | File source: C:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt, type: DROPPED |
Source: unknown | Process created: C:\Windows\SysWOW64\vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet |
Source: unknown | Process created: C:\Windows\SysWOW64\vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet |
Source: unknown | Process created: C:\Windows\SysWOW64\vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Process created: C:\Windows\SysWOW64\vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Process created: C:\Windows\SysWOW64\vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Process created: C:\Windows\SysWOW64\vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet |
Source: vssadmin.exe, 00000005.00000002.194132223.0000000003820000.00000004.00000040.sdmp | Binary or memory string: vssadmin.exeDeleteShadows/All/Quiet |
Source: vssadmin.exe, 00000005.00000002.194006335.00000000034C0000.00000002.00000001.sdmp | Binary or memory string: Example Usage: vssadmin Delete ShadowStorage |
Source: vssadmin.exe, 00000005.00000002.194006335.00000000034C0000.00000002.00000001.sdmp | Binary or memory string: Example Usage: vssadmin Delete Shadows /Type=ClientAccessible /For=C: |
Source: vssadmin.exe, 00000005.00000002.194006335.00000000034C0000.00000002.00000001.sdmp | Binary or memory string: vssadmin Delete Shadows |
Source: vssadmin.exe, 00000005.00000002.194006335.00000000034C0000.00000002.00000001.sdmp | Binary or memory string: Example Usage: vssadmin Delete Shadows /For=C: /Oldest |
Source: vssadmin.exe, 00000005.00000002.194006335.00000000034C0000.00000002.00000001.sdmp | Binary or memory string: Example Usage: vssadmin Delete ShadowStorage /For=C: /On=D: |
Source: vssadmin.exe, 00000005.00000002.194076681.0000000003577000.00000004.00000020.sdmp | Binary or memory string: - Code: ADMPROCC00001737- Call: ADMPROCC00001712- PID: 00005312- TID: 00006484- CMD: vssadmin.exe Delete Shadows /All /Quiet - User: Name: computer\user, SID:S-1-5-21-3853321935-2125563209-4053062332-1002 |
Source: vssadmin.exe, 00000005.00000002.194076681.0000000003577000.00000004.00000020.sdmp | Binary or memory string: - Code: ADMPROCC00001737- Call: ADMPROCC00001712- PID: 00005312- TID: 00006484- CMD: vssadmin.exe Delete Shadows /All /Quiet - User: Name: computer\user, SID:S-1-5-21-3853321935-2125563209-4053062332-1002 2 |
Source: vssadmin.exe, 00000005.00000002.193954930.0000000003420000.00000004.00000020.sdmp | Binary or memory string: C:\Users\user\Desktop\C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /QuietC:\Windows\SYSTEM32\vssadmin.exeWinsta0\Default |
Source: vssadmin.exe, 00000005.00000002.194065223.0000000003570000.00000004.00000020.sdmp | Binary or memory string: C:\Users\user\Desktop\C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /QuietC:\Windows\SYSTEM32\vssadmin.exeWinsta0\Default=::=::\ALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=computerComSpec=C:\Windows\system32\cmd.exeDriverData=C:\Windows\System32\Drivers\DriverDataHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\computerNUMBER_OF_PROCESSORS=4OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=x86PROCESSOR_ARCHITEW6432=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 85 Stepping 7, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=5507ProgramData=C:\ProgramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=RMDIWSRUSERDOMAIN_ROAMINGPROFILE=computerUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows |
Source: vssadmin.exe, 00000005.00000002.194065223.0000000003570000.00000004.00000020.sdmp | Binary or memory string: vssadmin.exe Delete Shadows /All /Quiet |
Source: vssadmin.exe, 00000005.00000002.194065223.0000000003570000.00000004.00000020.sdmp | Binary or memory string: vssadmin.exe Delete Shadows /All /QuietM |
Source: vssadmin.exe, 00000005.00000002.193536987.0000000002FDC000.00000004.00000010.sdmp | Binary or memory string: - Code: ADMPROCC00001737- Call: ADMPROCC00001712- PID: 00005312- TID: 00006484- CMD: vssadmin.exe Delete Shadows /All /Quiet - User: Name: computer\user, SID:S-1-5-21-3853321935-2125563209-4053062332-1002 - |
Source: vssadmin.exe, 0000000A.00000002.201881709.0000000003120000.00000004.00000020.sdmp | Binary or memory string: C:\Users\user\Desktop\C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /QuietC:\Windows\SYSTEM32\vssadmin.exeWinsta0\Default41 |
Source: vssadmin.exe, 0000000A.00000002.201377654.0000000002D5B000.00000004.00000010.sdmp | Binary or memory string: - Code: ADMPROCC00001737- Call: ADMPROCC00001712- PID: 00006852- TID: 00006872- CMD: vssadmin.exe Delete Shadows /All /Quiet - User: Name: computer\user, SID:S-1-5-21-3853321935-2125563209-4053062332-1002 |
Source: vssadmin.exe, 0000000A.00000002.201377654.0000000002D5B000.00000004.00000010.sdmp | Binary or memory string: - Code: ADMPROCC00001737- Call: ADMPROCC00001712- PID: 00006852- TID: 00006872- CMD: vssadmin.exe Delete Shadows /All /Quiet - User: Name: computer\user, SID:S-1-5-21-3853321935-2125563209-4053062332-1002 - |
Source: vssadmin.exe, 0000000E.00000002.215242717.0000000003220000.00000004.00000020.sdmp | Binary or memory string: C:\Users\user\Desktop\C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /QuietC:\Windows\SYSTEM32\vssadmin.exeWinsta0\Default |
Source: vssadmin.exe, 0000000E.00000002.215678172.00000000033F7000.00000004.00000020.sdmp | Binary or memory string: - Code: ADMPROCC00001737- Call: ADMPROCC00001712- PID: 00006804- TID: 00006744- CMD: vssadmin.exe Delete Shadows /All /Quiet - User: Name: computer\user, SID:S-1-5-21-3853321935-2125563209-4053062332-1002 |
Source: vssadmin.exe, 0000000E.00000002.215766264.0000000003580000.00000004.00000040.sdmp | Binary or memory string: vssadmin.exeDeleteShadows/All/QuietU |
Source: vssadmin.exe, 0000000E.00000002.215661251.00000000033F0000.00000004.00000020.sdmp | Binary or memory string: C:\Users\user\Desktop\C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /QuietC:\Windows\SYSTEM32\vssadmin.exeWinsta0\Default=::=::\ALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=computerComSpec=C:\Windows\system32\cmd.exeDriverData=C:\Windows\System32\Drivers\DriverDataHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\computerNUMBER_OF_PROCESSORS=4OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=x86PROCESSOR_ARCHITEW6432=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 85 Stepping 7, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=5507ProgramData=C:\ProgramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=RMDIWSRUSERDOMAIN_ROAMINGPROFILE=computerUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows |
Source: vssadmin.exe, 0000000E.00000002.215661251.00000000033F0000.00000004.00000020.sdmp | Binary or memory string: vssadmin.exe Delete Shadows /All /Quiet |
Source: vssadmin.exe, 0000000E.00000002.209393713.00000000030AB000.00000004.00000010.sdmp | Binary or memory string: - Code: ADMPROCC00001737- Call: ADMPROCC00001712- PID: 00006804- TID: 00006744- CMD: vssadmin.exe Delete Shadows /All /Quiet - User: Name: computer\user, SID:S-1-5-21-3853321935-2125563209-4053062332-1002 - |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\bg-BG\bootmgr.efi.mui entropy: 7.99767352248 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\bootmgr.efi entropy: 7.99982785052 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\bootmgfw.efi entropy: 7.99984853428 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\bg-BG\bootmgfw.efi.mui entropy: 7.99757968095 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\cs-CZ\memtest.efi.mui entropy: 7.99611311442 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\cs-CZ\bootmgfw.efi.mui entropy: 7.99765785664 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\cs-CZ\bootmgr.efi.mui entropy: 7.99743927094 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\da-DK\memtest.efi.mui entropy: 7.99573072181 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\de-DE\bootmgfw.efi.mui entropy: 7.99811900261 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\da-DK\bootmgfw.efi.mui entropy: 7.99773632677 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\da-DK\bootmgr.efi.mui entropy: 7.99806998468 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\el-GR\bootmgfw.efi.mui entropy: 7.9978620277 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\de-DE\memtest.efi.mui entropy: 7.99663634949 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\de-DE\bootmgr.efi.mui entropy: 7.99772507867 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\el-GR\memtest.efi.mui entropy: 7.99630769331 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\el-GR\bootmgr.efi.mui entropy: 7.99745550319 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\en-GB\bootmgr.efi.mui entropy: 7.99779634113 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\en-GB\bootmgfw.efi.mui entropy: 7.99776121437 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\en-US\bootmgfw.efi.mui entropy: 7.99801499242 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\es-ES\bootmgfw.efi.mui entropy: 7.99784014069 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\en-US\bootmgr.efi.mui entropy: 7.99783245141 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\en-US\memtest.efi.mui entropy: 7.99641729741 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\es-ES\bootmgr.efi.mui entropy: 7.9977966399 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\es-ES\memtest.efi.mui entropy: 7.99648254181 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\es-MX\bootmgr.efi.mui entropy: 7.99804511823 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\es-MX\bootmgfw.efi.mui entropy: 7.99784604376 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\et-EE\bootmgfw.efi.mui entropy: 7.99756062472 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\et-EE\bootmgr.efi.mui entropy: 7.99752504537 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fi-FI\bootmgfw.efi.mui entropy: 7.99764577312 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fi-FI\memtest.efi.mui entropy: 7.99568947322 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fi-FI\bootmgr.efi.mui entropy: 7.99775419813 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fr-FR\bootmgr.efi.mui entropy: 7.99833554439 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fr-CA\bootmgr.efi.mui entropy: 7.99814941145 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fr-CA\bootmgfw.efi.mui entropy: 7.99727479037 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fr-FR\memtest.efi.mui entropy: 7.99662548001 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\fr-FR\bootmgfw.efi.mui entropy: 7.99778568986 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\hr-HR\bootmgfw.efi.mui entropy: 7.99791449203 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\hr-HR\bootmgr.efi.mui entropy: 7.99794631558 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\hu-HU\bootmgfw.efi.mui entropy: 7.9978806884 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\hu-HU\bootmgr.efi.mui entropy: 7.99814847876 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\hu-HU\memtest.efi.mui entropy: 7.99670299437 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\it-IT\bootmgfw.efi.mui entropy: 7.99790660098 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\it-IT\bootmgr.efi.mui entropy: 7.99780119478 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\it-IT\memtest.efi.mui entropy: 7.99666687365 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ja-JP\bootmgfw.efi.mui entropy: 7.99752471793 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ja-JP\bootmgr.efi.mui entropy: 7.99735985188 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ja-JP\memtest.efi.mui entropy: 7.99634653772 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ko-KR\bootmgfw.efi.mui entropy: 7.99764806173 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ko-KR\memtest.efi.mui entropy: 7.99645138184 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ko-KR\bootmgr.efi.mui entropy: 7.99676070823 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\lt-LT\bootmgfw.efi.mui entropy: 7.99809263606 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\lt-LT\bootmgr.efi.mui entropy: 7.99777143253 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\lv-LV\bootmgfw.efi.mui entropy: 7.99758687714 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\lv-LV\bootmgr.efi.mui entropy: 7.9979469535 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\nb-NO\bootmgfw.efi.mui entropy: 7.99807701012 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\memtest.efi entropy: 7.99980308254 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\nb-NO\bootmgr.efi.mui entropy: 7.99777042299 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\nb-NO\memtest.efi.mui entropy: 7.99653031528 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\nl-NL\bootmgr.efi.mui entropy: 7.99764284228 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\nl-NL\bootmgfw.efi.mui entropy: 7.99792559087 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\nl-NL\memtest.efi.mui entropy: 7.99601190015 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pl-PL\bootmgfw.efi.mui entropy: 7.99760101807 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pl-PL\bootmgr.efi.mui entropy: 7.9977897217 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pl-PL\memtest.efi.mui entropy: 7.99649027566 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pt-BR\bootmgfw.efi.mui entropy: 7.99770748652 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pt-BR\bootmgr.efi.mui entropy: 7.99774535166 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pt-BR\memtest.efi.mui entropy: 7.99599733719 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pt-PT\bootmgr.efi.mui entropy: 7.99767871794 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pt-PT\bootmgfw.efi.mui entropy: 7.99767433907 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\pt-PT\memtest.efi.mui entropy: 7.99609785796 | Jump to dropped file |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ro-RO\bootmgr.efi.mui entropy: 7.99743311973 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ro-RO\bootmgfw.efi.mui entropy: 7.9979231121 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\qps-ploc\memtest.efi.mui entropy: 7.9966502389 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ru-RU\bootmgfw.efi.mui entropy: 7.99777411558 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ru-RU\bootmgr.efi.mui entropy: 7.99747147837 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sk-SK\bootmgfw.efi.mui entropy: 7.99797661226 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\ru-RU\memtest.efi.mui entropy: 7.99639212899 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sl-SI\bootmgr.efi.mui entropy: 7.99801438611 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sk-SK\bootmgr.efi.mui entropy: 7.99785601585 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sl-SI\bootmgfw.efi.mui entropy: 7.99791349688 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sr-Latn-RS\bootmgr.efi.mui entropy: 7.99804827548 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sr-Latn-RS\bootmgfw.efi.mui entropy: 7.998230714 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sv-SE\bootmgfw.efi.mui entropy: 7.99753156795 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sv-SE\memtest.efi.mui entropy: 7.99639626105 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\sv-SE\bootmgr.efi.mui entropy: 7.99782765987 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\tr-TR\bootmgfw.efi.mui entropy: 7.99771351628 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\tr-TR\memtest.efi.mui entropy: 7.99594786482 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\tr-TR\bootmgr.efi.mui entropy: 7.9980529753 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\uk-UA\bootmgr.efi.mui entropy: 7.99777663786 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\uk-UA\bootmgfw.efi.mui entropy: 7.99763433977 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\zh-CN\bootmgfw.efi.mui entropy: 7.99680187041 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\EFI\Microsoft\Boot\zh-CN\bootmgr.efi.mui entropy: 7.99725274242 | |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\bg-BG\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\cs-CZ\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\da-DK\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\de-DE\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\el-GR\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\en-GB\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\en-US\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\es-ES\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Desktop\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\es-MX\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Desktop\MQAWXUYAIK\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\et-EE\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\fi-FI\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\fr-FR\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\fr-CA\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\hr-HR\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Desktop\XQACHMZIHU\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\hu-HU\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\it-IT\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Documents\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\ja-JP\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Documents\MQAWXUYAIK\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\ko-KR\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\lt-LT\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\lv-LV\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\nb-NO\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Documents\XQACHMZIHU\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\nl-NL\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\pl-PL\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Downloads\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\pt-BR\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Favorites\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\pt-PT\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\ro-RO\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\qps-ploc\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\ru-RU\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\sk-SK\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\sl-SI\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\user\Searches\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\sr-Latn-RS\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\sv-SE\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\tr-TR\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\uk-UA\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: C:\Users\Public\Libraries\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | File created: Y:\EFI\Microsoft\Boot\zh-CN\fZYgl_readme_.txt | Jump to behavior |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\BCD VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\bg-BG\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\boot.stl VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\bootmgfw.efi VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\bootmgr.efi VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\bg-BG\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\cs-CZ\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\cs-CZ\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\cs-CZ\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\da-DK\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\da-DK\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\da-DK\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\de-DE\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\de-DE\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\de-DE\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\el-GR\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\el-GR\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\el-GR\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\en-GB\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\en-GB\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\en-US\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\en-US\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\en-US\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\es-ES\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\es-ES\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\DTBZGIOOSO.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\es-ES\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\FACWLRWHGG.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\es-MX\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\es-MX\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MNULNCRIYC.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MNULNCRIYC.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK\DTBZGIOOSO.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK\MNULNCRIYC.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\et-EE\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK\MQAWXUYAIK.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\et-EE\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK\NHPKIZUUSG.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK\QVTVNIBKSD.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK\TQDGENUHWP.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fi-FI\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fi-FI\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\MQAWXUYAIK.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fi-FI\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\NHPKIZUUSG.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\PSAMNLJHZW.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\QVTVNIBKSD.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\QVTVNIBKSD.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fr-CA\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fr-CA\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fr-FR\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\TQDGENUHWP.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fr-FR\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\fr-FR\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\hr-HR\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\hr-HR\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\XQACHMZIHU\FACWLRWHGG.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\XQACHMZIHU\MNULNCRIYC.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\XQACHMZIHU\MQAWXUYAIK.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\XQACHMZIHU\PSAMNLJHZW.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\XQACHMZIHU\XQACHMZIHU.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\XQACHMZIHU\QVTVNIBKSD.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\hu-HU\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\hu-HU\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\hu-HU\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Desktop\XQACHMZIHU.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\it-IT\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\it-IT\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\it-IT\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\FACWLRWHGG.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\DTBZGIOOSO.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MNULNCRIYC.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MNULNCRIYC.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ja-JP\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ja-JP\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ja-JP\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK\DTBZGIOOSO.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK\MNULNCRIYC.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK\MQAWXUYAIK.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK\NHPKIZUUSG.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK\QVTVNIBKSD.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ko-KR\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ko-KR\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ko-KR\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK\TQDGENUHWP.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\MQAWXUYAIK.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\NHPKIZUUSG.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\lt-LT\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\lt-LT\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\PSAMNLJHZW.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\QVTVNIBKSD.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\QVTVNIBKSD.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\lv-LV\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\lv-LV\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\TQDGENUHWP.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\memtest.efi VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\nb-NO\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\XQACHMZIHU\FACWLRWHGG.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\nb-NO\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\XQACHMZIHU\MNULNCRIYC.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\nb-NO\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\XQACHMZIHU\MQAWXUYAIK.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\XQACHMZIHU\PSAMNLJHZW.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\XQACHMZIHU\XQACHMZIHU.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\XQACHMZIHU\QVTVNIBKSD.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\nl-NL\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Documents\XQACHMZIHU.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\nl-NL\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\nl-NL\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pl-PL\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\FACWLRWHGG.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\DTBZGIOOSO.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\MNULNCRIYC.mp3 VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pl-PL\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\MNULNCRIYC.pdf VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\MQAWXUYAIK.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\MQAWXUYAIK.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pl-PL\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\NHPKIZUUSG.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\PSAMNLJHZW.png VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\QVTVNIBKSD.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\QVTVNIBKSD.xlsx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\TQDGENUHWP.jpg VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pt-BR\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pt-BR\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pt-BR\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Downloads\XQACHMZIHU.docx VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Bing.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Amazon.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pt-PT\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pt-PT\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Facebook.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Google.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\pt-PT\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Live.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ro-RO\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Reddit.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\NYTimes.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Twitter.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Wikipedia.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Favorites\Youtube.url VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ro-RO\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\qps-ploc\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ru-RU\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ru-RU\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\ru-RU\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sk-SK\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sk-SK\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sl-SI\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sl-SI\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Searches\Everywhere.search-ms VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sr-Latn-RS\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sr-Latn-RS\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\user\Searches\Indexed Locations.search-ms VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sv-SE\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sv-SE\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\sv-SE\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\tr-TR\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\tr-TR\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\tr-TR\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\uk-UA\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\uk-UA\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\Users\Public\Libraries\RecordedTV.library-ms VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\winsipolicy.p7b VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\zh-CN\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\zh-CN\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\zh-CN\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\zh-TW\bootmgfw.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\zh-TW\bootmgr.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\zh-TW\memtest.efi.mui VolumeInformation |
Source: C:\Users\user\Desktop\Avaddon Ransomware.exe | Queries volume information: C:\EFI\Microsoft\Boot\Fonts\chs_boot.ttf VolumeInformation |