Source: RegSvcs.exe, 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://127.0.0.1:HTTP/1.1 |
Source: RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi |
Source: RegSvcs.exe, 00000003.00000002.366864567.00000000033DB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://dmstech.in |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000003.241071729.0000000001B1D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://en.w |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://fontfabrik.com |
Source: RegSvcs.exe, 00000003.00000002.366864567.00000000033DB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://mail.dmstech.in |
Source: RegSvcs.exe, 00000003.00000003.320266236.0000000006602000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://microsoft.coY |
Source: RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://sWLumX.com |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.279939033.0000000003491000.00000004.00000800.00020000.00000000.sdmp, WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.carterandcone.coml |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers? |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designersG |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fonts.com |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.goodfont.co.kr |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sajatypeworks.com |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sakkal.com |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sandoll.co.kr |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.tiro.com |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.typography.netD |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.urwpp.deDPlease |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.zhongyicts.com.cn |
Source: RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520049418.00000000036E9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://3NOOLBR7kS.org |
Source: RegSvcs.exe, 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www |
Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: 4.2.WytzFSULZWRc.exe.330ba34.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.35aba94.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: Process Memory Space: PURCHASE ORDER # 12076038 & 12076022.exe PID: 6092, type: MEMORYSTR |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: Process Memory Space: RegSvcs.exe PID: 4700, type: MEMORYSTR |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: Process Memory Space: WytzFSULZWRc.exe PID: 2336, type: MEMORYSTR |
Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20 |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.cs |
High entropy of concatenated method names: '.cctor', 'Hv7aJisxkSXT2', 'IbFKUwh7eQ', 'zmPKhgUsvr', 'vC6Kom7A2Z', 'WEsKAyJur1', 'mA2KOqXGJt', 'DxrK0lS3wu', 'MPtKEdqErM', 'R8hKx5Bqn0' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/Q6qGrMWpsJtFfdBU1i.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'LAHlNOK6u5', 'anboti67UZ', 'FwToUoAPC4', 'UHloebKQto', 'updoDiWdjM', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/RnXpZdQtwQpMhw9iMl.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'Vtv9NMP3mZ', 'hUKo79qtHJ', 'xDpoasYMrD', 'FXEolApcGL', 'AVuoRBtOEK', 'iIboAaOaaU', 'RmsoK51O2J', 'AQEo8Dbbi3' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/CldwuoRdykqqYjFEFj.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'gC1ltSHwcn', 'UHloebKQto', 'updoDiWdjM', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/X69VBSAYxwQs2Ac2mA.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'OdBQgpLHWt', 'hUKo79qtHJ', 'xDpoasYMrD', 'KI2geD0ZIv', 'XuDgDoYeAy', 'cjegjtCqe8', 'uJeg2v9tJP', 'hR5gBgqgGq' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/Q4EvWR9NJyhZOqWWHA.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'n4mFkxTwaj', 'UHloebKQto', 'updoDiWdjM', 'vHRbAnAgYX', 'eV7bKPA6ON', 'NFybbRclS9', 'ECsbZOfkho', 'GEtbokZEBh' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/fW6lUreU3immxdBQSS.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'iBRFEbGuV2', 'anboti67UZ', 'FwToUoAPC4', 'R8VgcEIxNI', 'bEbgpS0Dgj', 'DY0b1KMDbh', 'HaBbMKiuXZ', 'pN3gtXTTf4' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/yIRg8DskOKIX5TsYJa.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'iPpQEZFHyT', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm', 'gdpo2SBQmv', 'eIqokm3G5A' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/TKr659h2OpVFvWFlxm.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'e47B60WEc', 'mL46IQn8hb', 'eQx6OkW4Oe', 'l4m69XsGV2', 'gh76WpgUbW', 'Sxi6VW9XyJ', 'B1U6QCWTV2', 'Bcr60U3LED' |
Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.cs |
High entropy of concatenated method names: '.ctor', 'K6E99yODGT', 'llg9lUjqB9', 'Ka59QDxSQv', 'vn99Fch9rF', 'cpb9KvHt89', 'DfM9b3oVdb', 'T0A96PRGAr', 'Dispose', 'c0Q9Z9iGa5' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.cs |
High entropy of concatenated method names: '.cctor', 'Hv7aJisxkSXT2', 'IbFKUwh7eQ', 'zmPKhgUsvr', 'vC6Kom7A2Z', 'WEsKAyJur1', 'mA2KOqXGJt', 'DxrK0lS3wu', 'MPtKEdqErM', 'R8hKx5Bqn0' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/RnXpZdQtwQpMhw9iMl.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'Vtv9NMP3mZ', 'hUKo79qtHJ', 'xDpoasYMrD', 'FXEolApcGL', 'AVuoRBtOEK', 'iIboAaOaaU', 'RmsoK51O2J', 'AQEo8Dbbi3' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/Q6qGrMWpsJtFfdBU1i.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'LAHlNOK6u5', 'anboti67UZ', 'FwToUoAPC4', 'UHloebKQto', 'updoDiWdjM', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/CldwuoRdykqqYjFEFj.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'gC1ltSHwcn', 'UHloebKQto', 'updoDiWdjM', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/X69VBSAYxwQs2Ac2mA.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'OdBQgpLHWt', 'hUKo79qtHJ', 'xDpoasYMrD', 'KI2geD0ZIv', 'XuDgDoYeAy', 'cjegjtCqe8', 'uJeg2v9tJP', 'hR5gBgqgGq' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/TKr659h2OpVFvWFlxm.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'e47B60WEc', 'mL46IQn8hb', 'eQx6OkW4Oe', 'l4m69XsGV2', 'gh76WpgUbW', 'Sxi6VW9XyJ', 'B1U6QCWTV2', 'Bcr60U3LED' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/Q4EvWR9NJyhZOqWWHA.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'n4mFkxTwaj', 'UHloebKQto', 'updoDiWdjM', 'vHRbAnAgYX', 'eV7bKPA6ON', 'NFybbRclS9', 'ECsbZOfkho', 'GEtbokZEBh' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.cs |
High entropy of concatenated method names: '.ctor', 'K6E99yODGT', 'llg9lUjqB9', 'Ka59QDxSQv', 'vn99Fch9rF', 'cpb9KvHt89', 'DfM9b3oVdb', 'T0A96PRGAr', 'Dispose', 'c0Q9Z9iGa5' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/fW6lUreU3immxdBQSS.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'iBRFEbGuV2', 'anboti67UZ', 'FwToUoAPC4', 'R8VgcEIxNI', 'bEbgpS0Dgj', 'DY0b1KMDbh', 'HaBbMKiuXZ', 'pN3gtXTTf4' |
Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/yIRg8DskOKIX5TsYJa.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'iPpQEZFHyT', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm', 'gdpo2SBQmv', 'eIqokm3G5A' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.cs |
High entropy of concatenated method names: '.cctor', 'Hv7aJisxkSXT2', 'IbFKUwh7eQ', 'zmPKhgUsvr', 'vC6Kom7A2Z', 'WEsKAyJur1', 'mA2KOqXGJt', 'DxrK0lS3wu', 'MPtKEdqErM', 'R8hKx5Bqn0' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/RnXpZdQtwQpMhw9iMl.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'Vtv9NMP3mZ', 'hUKo79qtHJ', 'xDpoasYMrD', 'FXEolApcGL', 'AVuoRBtOEK', 'iIboAaOaaU', 'RmsoK51O2J', 'AQEo8Dbbi3' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/Q6qGrMWpsJtFfdBU1i.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'LAHlNOK6u5', 'anboti67UZ', 'FwToUoAPC4', 'UHloebKQto', 'updoDiWdjM', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/CldwuoRdykqqYjFEFj.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'gC1ltSHwcn', 'UHloebKQto', 'updoDiWdjM', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/X69VBSAYxwQs2Ac2mA.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'OdBQgpLHWt', 'hUKo79qtHJ', 'xDpoasYMrD', 'KI2geD0ZIv', 'XuDgDoYeAy', 'cjegjtCqe8', 'uJeg2v9tJP', 'hR5gBgqgGq' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/Q4EvWR9NJyhZOqWWHA.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'n4mFkxTwaj', 'UHloebKQto', 'updoDiWdjM', 'vHRbAnAgYX', 'eV7bKPA6ON', 'NFybbRclS9', 'ECsbZOfkho', 'GEtbokZEBh' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/TKr659h2OpVFvWFlxm.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'e47B60WEc', 'mL46IQn8hb', 'eQx6OkW4Oe', 'l4m69XsGV2', 'gh76WpgUbW', 'Sxi6VW9XyJ', 'B1U6QCWTV2', 'Bcr60U3LED' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/yIRg8DskOKIX5TsYJa.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'iPpQEZFHyT', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm', 'gdpo2SBQmv', 'eIqokm3G5A' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.cs |
High entropy of concatenated method names: '.ctor', 'K6E99yODGT', 'llg9lUjqB9', 'Ka59QDxSQv', 'vn99Fch9rF', 'cpb9KvHt89', 'DfM9b3oVdb', 'T0A96PRGAr', 'Dispose', 'c0Q9Z9iGa5' |
Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/fW6lUreU3immxdBQSS.cs |
High entropy of concatenated method names: '.ctor', 'Dispose', 'iBRFEbGuV2', 'anboti67UZ', 'FwToUoAPC4', 'R8VgcEIxNI', 'bEbgpS0Dgj', 'DY0b1KMDbh', 'HaBbMKiuXZ', 'pN3gtXTTf4' |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 100000 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99875 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99765 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99655 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99546 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99437 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99327 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99216 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99106 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98997 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98888 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98780 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98672 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98559 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98453 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98341 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98234 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98125 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98015 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 97905 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 97796 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 97687 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 97577 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 97468 |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 922337203685477 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 100000 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99843 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99734 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99624 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99512 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99390 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99280 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99172 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 99062 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98953 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98841 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98695 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98578 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98452 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98344 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98212 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 98109 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 97993 |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Thread delayed: delay time: 97890 |
|
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe |
Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation |
|