Loading ...

Play interactive tourEdit tour

Analysis Report Manuel.doc.vbe

Overview

General Information

Sample Name:Manuel.doc.vbe
Analysis ID:369332
MD5:cc2db35f43b4a12700c431811a463439
SHA1:d838aaf8d656b7d8d0f48d13646e677eaad35f20
SHA256:fe9c78249937d57aaed2792238caeea298e715d9cf261add1fbfbaeeab084d40
Infos:

Most interesting Screenshot:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Creates an autostart registry key pointing to binary in C:\Windows
Sample contains encoded VBS code
Suspicious javascript / visual basic script found (invalid extension)
Uses an obfuscated file name to hide its real file extension (double extension)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
May sleep (evasive loops) to hinder dynamic analysis

Classification

Startup

  • System is w7x64
  • wscript.exe (PID: 2372 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Manuel.doc.vbe' MD5: 045451FA238A75305CC26AC982472367)
    • cmd.exe (PID: 2560 cmdline: 'C:\Windows\System32\cmd.exe' /c start wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • wscript.exe (PID: 2300 cmdline: wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db MD5: 045451FA238A75305CC26AC982472367)
  • cmd.exe (PID: 2824 cmdline: 'C:\WINDOWS\system32\cmd.exe' /c start wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
    • wscript.exe (PID: 2704 cmdline: wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db MD5: 045451FA238A75305CC26AC982472367)
  • cmd.exe (PID: 2480 cmdline: 'C:\WINDOWS\system32\cmd.exe' /c start wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
    • wscript.exe (PID: 1616 cmdline: wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db MD5: 045451FA238A75305CC26AC982472367)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: Manuel.doc.vbeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: Manuel.doc.vbeVirustotal: Detection: 75%Perma Link
Source: Manuel.doc.vbeMetadefender: Detection: 55%Perma Link
Source: Manuel.doc.vbeReversingLabs: Detection: 74%
Source: Binary string: wshom.pdb source: wscript.exe, 00000004.00000002.3148533955.0000000001F70000.00000002.00000001.sdmp, wscript.exe, 00000007.00000002.3148046580.0000000000370000.00000002.00000001.sdmp, wscript.exe, 0000000A.00000002.3148147651.0000000000470000.00000002.00000001.sdmp
Source: unknownDNS traffic detected: queries for: realy.mooo.com
Source: wscript.exe, 00000000.00000003.2068250667.00000000003EC000.00000004.00000001.sdmpString found in binary or memory: http://realy.mooo.com
Source: wscript.exe, 00000000.00000003.2068250667.00000000003EC000.00000004.00000001.sdmp, wscript.exe, 00000004.00000002.3148136888.000000000041E000.00000004.00000020.sdmp, wscript.exe, 0000000A.00000002.3148055856.00000000002AE000.00000004.00000020.sdmpString found in binary or memory: http://realy.mooo.com/
Source: wscript.exe, 00000007.00000002.3148075473.000000000043E000.00000004.00000020.sdmpString found in binary or memory: http://realy.mooo.com/(
Source: wscript.exe, 0000000A.00000002.3148055856.00000000002AE000.00000004.00000020.sdmpString found in binary or memory: http://realy.mooo.com/bo
Source: wscript.exe, 00000004.00000002.3148976708.000000000490E000.00000004.00000001.sdmp, wscript.exe, 00000004.00000002.3148136888.000000000041E000.00000004.00000020.sdmp, wscript.exe, 00000007.00000002.3148926880.000000000393A000.00000004.00000001.sdmp, wscript.exe, 00000007.00000002.3148114769.00000000004C7000.00000004.00000020.sdmp, wscript.exe, 0000000A.00000002.3148963520.0000000003EB6000.00000004.00000001.sdmpString found in binary or memory: http://realy.mooo.com/bot/lancer/index.php?cmd=ping
Source: wscript.exe, 00000007.00000002.3148114769.00000000004C7000.00000004.00000020.sdmp, wscript.exe, 0000000A.00000002.3148939482.0000000003E90000.00000004.00000001.sdmpString found in binary or memory: http://realy.mooo.com/bot/lancer/index.php?cmd=pingAdva
Source: wscript.exe, 00000004.00000002.3148203777.00000000004A6000.00000004.00000020.sdmpString found in binary or memory: http://realy.mooo.com/bot/lancer/index.php?cmd=pingAdvaX%L
Source: wscript.exe, 00000000.00000002.2070144321.0000000005120000.00000002.00000001.sdmp, wscript.exe, 00000004.00000002.3149096479.00000000051E0000.00000002.00000001.sdmp, wscript.exe, 00000007.00000002.3149114904.0000000005280000.00000002.00000001.sdmp, wscript.exe, 0000000A.00000002.3149109885.0000000005410000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: wscript.exe, 00000000.00000002.2068750916.0000000001CE0000.00000002.00000001.sdmp, wscript.exe, 00000004.00000002.3148277604.0000000001C00000.00000002.00000001.sdmp, wscript.exe, 00000007.00000002.3148226103.0000000001C50000.00000002.00000001.sdmp, wscript.exe, 0000000A.00000002.3148231089.0000000001C60000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
Source: wscript.exe, 00000000.00000002.2070144321.0000000005120000.00000002.00000001.sdmp, wscript.exe, 00000004.00000002.3149096479.00000000051E0000.00000002.00000001.sdmp, wscript.exe, 00000007.00000002.3149114904.0000000005280000.00000002.00000001.sdmp, wscript.exe, 0000000A.00000002.3149109885.0000000005410000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA

System Summary:

barindex
Sample contains encoded VBS codeShow sources
Source: Manuel.doc.vbe.vbe_unpackBinary string: End Function
Source: Manuel.doc.vbe.vbe_unpackBinary string: End Function
Suspicious javascript / visual basic script found (invalid extension)Show sources
Source: unknownProcess created: C:\Windows\System32\wscript.exe wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db
Source: unknownProcess created: C:\Windows\System32\wscript.exe wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db
Source: unknownProcess created: C:\Windows\System32\wscript.exe wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.db
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.dbJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.dbJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript /e:VBScript.Encode C:\Users\user\AppData\Local\Temp\SysinfY2X.dbJump to behavior
Source: classification engineClassification label: mal80.evad.winVBE@11/1@63/1
Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\SysinfY2X.dbJump to behavior
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process Where Name = 'wscript.exe' AND CommandLine LIKE '%SysinfYhX.db%'
Source: C:\Windows\System32\wscript.ex