Source: | Binary string: Accessibility.pdb source: vbc.exe, 00000009.00000003.246333764.0000000005245000.00000004.00000001.sdmp |
Source: | Binary string: RunPE.pdb source: Payment_Confirmation pdf.exe, 00000000.00000002.233292165.0000000002A01000.00000004.00000001.sdmp |
Source: | Binary string: vbc.pdb source: dhcpmon.exe, dhcpmon.exe.4.dr |
Source: | Binary string: Accessibility.pdbBSJB source: vbc.exe, 00000009.00000003.246333764.0000000005245000.00000004.00000001.sdmp |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.244.38.210 |
Source: 00000000.00000002.233380857.0000000003A01000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000000.00000002.233380857.0000000003A01000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: Process Memory Space: Payment_Confirmation pdf.exe PID: 2800, type: MEMORY | Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: Process Memory Space: Payment_Confirmation pdf.exe PID: 2800, type: MEMORY | Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Code function: 0_2_00F46878 | 0_2_00F46878 |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Code function: 0_2_00F41820 | 0_2_00F41820 |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Code function: 0_2_00F41811 | 0_2_00F41811 |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Code function: 0_2_00F415C0 | 0_2_00F415C0 |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Code function: 0_2_00F415B1 | 0_2_00F415B1 |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Code function: 0_2_00F40682 | 0_2_00F40682 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D420DD | 11_2_00D420DD |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D42066 | 11_2_00D42066 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00E91438 | 11_2_00E91438 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D41424 | 11_2_00D41424 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00EDE9EE | 11_2_00EDE9EE |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00EDF9BA | 11_2_00EDF9BA |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D4DD20 | 11_2_00D4DD20 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D5A699 | 11_2_00D5A699 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00DAF65C | 11_2_00DAF65C |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00F44BCE | 11_2_00F44BCE |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00EDE3B9 | 11_2_00EDE3B9 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D420DD | 13_2_00D420DD |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00DD50F2 | 13_2_00DD50F2 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D42066 | 13_2_00D42066 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00EDE9EE | 13_2_00EDE9EE |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00EDF9BA | 13_2_00EDF9BA |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D47279 | 13_2_00D47279 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00F44BCE | 13_2_00F44BCE |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00EDE3B9 | 13_2_00EDE3B9 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00E91438 | 13_2_00E91438 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D4E430 | 13_2_00D4E430 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D41424 | 13_2_00D41424 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D4DD20 | 13_2_00D4DD20 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00DD7614 | 13_2_00DD7614 |
Source: 00000000.00000002.233380857.0000000003A01000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000000.00000002.233380857.0000000003A01000.00000004.00000001.sdmp, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: Process Memory Space: Payment_Confirmation pdf.exe PID: 2800, type: MEMORY | Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: Process Memory Space: Payment_Confirmation pdf.exe PID: 2800, type: MEMORY | Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: Payment_Confirmation pdf.exe, hpCGGsxnBfkpZyTC.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 0.2.Payment_Confirmation pdf.exe.590000.0.unpack, hpCGGsxnBfkpZyTC.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 0.0.Payment_Confirmation pdf.exe.590000.0.unpack, hpCGGsxnBfkpZyTC.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5972:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5992:120:WilError_01 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Mutant created: \Sessions\1\BaseNamedObjects\Global\{8b524be1-f4fe-4386-bd3a-d447c26466aa} |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4604:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1304:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5796:120:WilError_01 |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll | Jump to behavior |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Section loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\Payment_Confirmation pdf.exe 'C:\Users\user\Desktop\Payment_Confirmation pdf.exe' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | |
Source: unknown | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp863B.tmp' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8988.tmp' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe 0 | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp863B.tmp' | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8988.tmp' | Jump to behavior |
Source: | Binary string: Accessibility.pdb source: vbc.exe, 00000009.00000003.246333764.0000000005245000.00000004.00000001.sdmp |
Source: | Binary string: RunPE.pdb source: Payment_Confirmation pdf.exe, 00000000.00000002.233292165.0000000002A01000.00000004.00000001.sdmp |
Source: | Binary string: vbc.pdb source: dhcpmon.exe, dhcpmon.exe.4.dr |
Source: | Binary string: Accessibility.pdbBSJB source: vbc.exe, 00000009.00000003.246333764.0000000005245000.00000004.00000001.sdmp |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D43560 push eax; iretd | 11_2_00D43581 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D42AC8 push A80020C3h; ret | 11_2_00D42ACD |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D42B08 push B80020CAh; retf 0020h | 11_2_00D42B29 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 11_2_00D42B30 push B80020CAh; retf 0020h | 11_2_00D42B29 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D42AC8 push A80020C3h; ret | 13_2_00D42ACD |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D42B08 push B80020CAh; retf 0020h | 13_2_00D42B29 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D42B30 push B80020CAh; retf 0020h | 13_2_00D42B29 |
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe | Code function: 13_2_00D43560 push eax; iretd | 13_2_00D43581 |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 402000 | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 420000 | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 422000 | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 51A1008 | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp863B.tmp' | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp8988.tmp' | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Queries volume information: C:\Users\user\Desktop\Payment_Confirmation pdf.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment_Confirmation pdf.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\Secur |