VMRay Analyzer Report for Sample #472754
VMRay Analyzer
3.2.1
Process
1
2716
tkqust.exe
1092
tkqust.exe
"C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\tkqust.exe"
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\
c:\users\5p5nrgjn0js halpmcxz\desktop\tkqust.exe
Child_Of
Created
Opened
Opened
Created
Created
Opened
Opened
Opened
Opened
Process
2
2568
cmd.exe
2716
cmd.exe
"C:\Windows\system32\cmd.exe"
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\
c:\windows\system32\cmd.exe
Child_Of
Child_Of
Created
Opened
Opened
Opened
Process
3
1792
mode.com
2568
mode.com
mode con cp select=1251
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\
c:\windows\system32\mode.com
Process
4
2132
vssadmin.exe
2568
vssadmin.exe
vssadmin delete shadows /all /quiet
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\
c:\windows\system32\vssadmin.exe
Process
6
1248
tkqust.exe
920
tkqust.exe
"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\tkqust.exe"
C:\Windows\system32\
c:\programdata\microsoft\windows\start menu\programs\startup\tkqust.exe
Child_Of
Created
Opened
Opened
Created
Created
Opened
Opened
Opened
Opened
Modified_Properties_Of
Opened
Process
7
1256
tkqust.exe
920
tkqust.exe
"C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tkqust.exe"
C:\Windows\system32\
c:\users\5p5nrgjn0js halpmcxz\appdata\roaming\microsoft\windows\start menu\programs\startup\tkqust.exe
Opened
Opened
Process
8
1500
cmd.exe
1248
cmd.exe
"C:\Windows\system32\cmd.exe"
C:\Windows\system32\
c:\windows\system32\cmd.exe
Child_Of
Child_Of
Created
Opened
Opened
Opened
Process
9
1636
mode.com
1500
mode.com
mode con cp select=1251
C:\Windows\system32\
c:\windows\system32\mode.com
Process
10
1716
vssadmin.exe
1500
vssadmin.exe
vssadmin delete shadows /all /quiet
C:\Windows\system32\
c:\windows\system32\vssadmin.exe
Mutex
Global\syncronize_5WOJV0A
Mutex
Global\syncronize_5WOJV0U
Mutex
Global\syncronize_5WOJV0A
Mutex
Global\syncronize_5WOJV0U
WinRegistryKey
Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE
tkqust.exe
C:\Windows\System32\tkqust.exe
REG_SZ
WinRegistryKey
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_LOCAL_MACHINE
Startup
WinRegistryKey
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_CURRENT_USER
Startup
Startup
WinRegistryKey
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_LOCAL_MACHINE
Common Startup
Common Startup
WinRegistryKey
Software\Policies\Microsoft\Windows\System
HKEY_CURRENT_USER
WinRegistryKey
Software\Microsoft\Command Processor
HKEY_LOCAL_MACHINE
DisableUNCCheck
EnableExtensions
DelayedExpansion
DefaultColor
CompletionChar
PathCompletionChar
AutoRun
DisableUNCCheck
EnableExtensions
DelayedExpansion
DefaultColor
CompletionChar
PathCompletionChar
AutoRun
WinRegistryKey
Software\Microsoft\Command Processor
HKEY_CURRENT_USER
DisableUNCCheck
EnableExtensions
DelayedExpansion
DefaultColor
CompletionChar
PathCompletionChar
AutoRun
DisableUNCCheck
EnableExtensions
DelayedExpansion
DefaultColor
CompletionChar
PathCompletionChar
AutoRun
WinRegistryKey
Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER
tkqust.exe
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\tkqust.exe
REG_SZ
WinRegistryKey
Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE
tkqust.exe
6204760
REG_SZ
WinRegistryKey
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_LOCAL_MACHINE
Startup
Mutex
Global\syncronize_5WOJV0A
Mutex
Global\syncronize_5WOJV0U
Analyzed Sample #472754
Malware Artifacts
472754
Sample-ID: #472754
Job-ID: #1210485
This sample was analyzed by VMRay Analyzer 3.2.1 on a Windows 7 system
100
VTI Score based on VTI Database Version 3.6
Metadata of Sample File #472754
Submission-ID: #3707933
870a9f338ff52d8352c760c14a1e0a10093d1f73a0b4569f1a02136f4d3d5177exe
MD5
13444cbb9e0942fd7f7adb39dba72e54
SHA1
8f1e8efd95b98efaec9dbef1b5466ba4038fec63
SHA256
870a9f338ff52d8352c760c14a1e0a10093d1f73a0b4569f1a02136f4d3d5177
Opened_By
Metadata of Analysis for Job-ID #1210485
True
Timeout
True
240.041
XDUWTFONO
win7_64_sp1
x86 64-bit
Windows 7
6.1.7601.17514 (3844dbb9-2017-4967-be7a-a4a2c20430fa)
5p5NrGJn0jS HALPmcxz
XDUWTFONO
This is a property collection for additional information of VMRay analysis
VMRay Analyzer
Obfuscation
VTI rule match with VTI rule score 2/5
vmray_dynamic_api_usage_by_api
Resolves an unusually high number of APIs.
Resolves APIs dynamically to possibly evade static detection
Mutex
VTI rule match with VTI rule score 1/5
vmray_create_named_mutex
Creates mutex with name "Global\syncronize_5WOJV0A".
Creates mutex
Mutex
VTI rule match with VTI rule score 1/5
vmray_create_named_mutex
Creates mutex with name "Global\syncronize_5WOJV0U".
Creates mutex
Discovery
VTI rule match with VTI rule score 0/5
vmray_enumerate_processes
Enumerates running processes.
Enumerates running processes
System Modification
VTI rule match with VTI rule score 1/5
vmray_create_file_in_os_dir
Creates file "C:\Windows\System32\tkqust.exe" in the OS directory.
Modifies operating system directory
Persistence
VTI rule match with VTI rule score 1/5
vmray_install_startup_script_by_registry
Adds "C:\Windows\System32\tkqust.exe" to Windows startup via registry.
Installs system startup script or application
Persistence
VTI rule match with VTI rule score 1/5
vmray_install_startup_script_by_file
Adds "c:\users\5p5nrgjn0js halpmcxz\appdata\roaming\microsoft\windows\start menu\programs\startup\tkqust.exe" to Windows startup folder.
Installs system startup script or application
Persistence
VTI rule match with VTI rule score 1/5
vmray_install_startup_script_by_file
Adds "c:\programdata\microsoft\windows\start menu\programs\startup\tkqust.exe" to Windows startup folder.
Installs system startup script or application
Hide Tracks
VTI rule match with VTI rule score 1/5
vmray_create_process_with_hidden_window
The process "C:\Windows\system32\cmd.exe" starts with hidden window.
Creates process with hidden window
Hide Tracks
VTI rule match with VTI rule score 1/5
vmray_change_folder_appearance
Folder "c:\$recycle.bin\s-1-5-21-3388679973-3930757225-3770151564-1000" has a changed appearance.
Changes folder appearance
Obfuscation
VTI rule match with VTI rule score 1/5
vmray_read_from_remote_process
"c:\windows\system32\cmd.exe" reads from "C:\Windows\system32\mode.com".
Reads from memory of another process
Obfuscation
VTI rule match with VTI rule score 1/5
vmray_read_from_remote_process
"c:\windows\system32\cmd.exe" reads from "C:\Windows\system32\vssadmin.exe".
Reads from memory of another process
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\grphflt\ms.eps.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\grphflt\ms.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\grphflt\ms.jpg.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\grphflt\ms.png.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\flickanimation.avi.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\hwruklm.dat.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\hwrusash.dat.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\1033\ado210.chm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\hwruksh.dat.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\hwrusalm.dat.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\access.en-us\accessmui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\1033\readme.htm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\access.en-us\accessmuiset.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\access.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\excel.en-us\excelmui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\groove.en-us\groovemui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\excel.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\infopath.en-us\infopathmui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\infopath.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\branding.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\oct.chm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\groove.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\officemui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\officemuiset.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\pss10o.chm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\pss10r.chm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\setup.chm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\psconfig.chm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office32.ww\office32ww.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\onenote.en-us\onenotemui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office32.en-us\office32mui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\office32.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\outlook.en-us\outlookmui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\outlook.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\powerpoint.en-us\powerpointmui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\onenote.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\powerpoint.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\project.en-us\projectmui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\project.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\prjpror\prjprorww.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\prjpror\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\proof.en\proof.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\proof.es\proof.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\proof.fr\proof.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\proofing.en-us\proofing.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\publisher.en-us\publishermui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\proofing.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\visio.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\proplusr\proplusrww.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\proplusr\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\visio.en-us\visiomui.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\publisher.en-us\setup.xml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
Persistence
VTI rule match with VTI rule score 1/5
vmray_install_startup_script_by_registry
Adds "6204760" to Windows startup via registry.
Installs system startup script or application
Persistence
VTI rule match with VTI rule score 1/5
vmray_install_startup_script_by_registry
Adds "C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\tkqust.exe" to Windows startup via registry.
Installs system startup script or application
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\help\itircl55.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\inkobj.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\micaut.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\ink\mraut.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\filters\visfilt.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\acecore.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\acewdat.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\csi.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\csisoap.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\cultures\office.odf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\iacom2.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\mso.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\msores.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\1033\msointl.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\prjres.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\riched20.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppcext.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppobjs.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppsvc.exe.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\office14\office setup controller\osetup.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\translat\arfr\msb1arfr.its.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\translat\msb1ar.lex.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\vba\vba7\vbe7.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
Hide Tracks
VTI rule match with VTI rule score 1/5
vmray_change_folder_appearance
Folder "c:\program files" has a changed appearance.
Changes folder appearance
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\desktop.ini.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\babygirl\16_9-frame-highlight.png".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\common files\microsoft shared\web server extensions\14\bin\fpsrvutl.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\dvdmaker.exe.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\omdbase.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\performance\title_page.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\performance\title_page_pal.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\pipeline.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\pipetran.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\msmdlocal.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\omdproject.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\resources\1033\msmdsrv.rll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\msolap100.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\resources\1033\msolui100.rll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsmainbackground.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsmainbackground_pal.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsmaintonotesbackground.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsmaintonotesbackground_pal.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsmaintoscenesbackground.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsmaintoscenesbackground_pal.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsnotesbackground.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsnotesbackground_pal.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsscenesbackground.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\dvd maker\shared\dvdstyles\sports\sportsscenesbackground_pal.wmv.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\as90.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\informix.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\msjet.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\as80.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\sql2000.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\msmgdsrv.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\sql70.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\sql90.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00011_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft analysis services\as oledb\10\cartridges\sybase.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\baby_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00004_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\carbn_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00011_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\east_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00037_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\cmnty_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00021_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\explr_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00038_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00038_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00040_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fincl_02.mid".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fall_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fincl_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00057_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00052_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00090_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\grid_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fincl_02.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00092_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\grden_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00103_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00120_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00126_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00103_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\indst_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00135_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00139_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00135_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00142_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00129_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\java_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00130_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00154_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\jngle_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00157_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\htech_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\music_01.mid".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\music_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00160_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00158_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00161_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\nbook_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00163_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ocean_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00164_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\outdr_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00163_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00165_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00167_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_02.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_03.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00169_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00170_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_04.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00171_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\paper_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_07.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00175_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00175_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00176_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_06.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_09.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_08.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_05.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00172_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ag00174_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an00853_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an00790_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an00015_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an00010_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\road_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\parnt_10.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\schol_02.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\safri_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\show_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\space_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an00914_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an00965_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01039_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\sprng_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\sumer_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01044_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\swest_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an00932_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01173_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01084_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01060_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\urban_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01174_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\wnter_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01184_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\angles.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01216_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01218_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01251_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an01545_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an02122_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an02559_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an02724_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an02122_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04108_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an03500_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an03500_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\adjacency.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04117_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04134_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\vctrn_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04191_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04195_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\apex.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04196_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04225_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04206_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\apothecary.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04174_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04225_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04235_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\aspect.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04267_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04323_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04269_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04326_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04355_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04332_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04369_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04384_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\austin.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\black tie.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\clarity.eftx".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\an04385_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd00141_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\clarity.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd00116_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd00155_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\civic.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\composite.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd00160_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd00146_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\concourse.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd00160_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd00173_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd05119_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\couture.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\elemental.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd06200_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd07804_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\essential.eftx".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\equity.eftx".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\equity.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd06102_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd07761_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd07831_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd08773_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd08808_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\essential.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd08758_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd07831_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\flow.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\executive.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd08868_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd09031_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd09194_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\foundry.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd09664_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd09662_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd09662_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\hardcover.eftx".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd10890_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\hardcover.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\grid.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\median.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\horizon.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19563_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19563_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\metro.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\newsprint.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\module.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19582_.gif".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19695_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19827_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd10972_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19986_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19828_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19582_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd19988_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\oriel.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\origin.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\opulent.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bd20013_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\paper.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00008_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00045_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00098_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\perspective.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00012_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00105_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\pushpin.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\slipstream.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\solstice.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00130_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\technic.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00122_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00148_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00152_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\urban.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00194_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00234_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00234_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00195_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00242_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00247_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00248_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\thatch.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\media\cagcat10\1033\cagcat10.mml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\waveform.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\verve.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\document themes 14\theme effects\trek.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00252_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00261_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00254_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00265_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00262_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00267_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\media\cagcat10\cagcat10.mmw.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\media\office14\1033\office10.mml.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00269_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00273_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00273_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00270_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00274_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00296_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\media\office14\autoshap\autoshap.dll".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00392_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00525_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00390_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00526_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00648_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00524_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00923_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00921_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\media\office14\office10.mmw.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00985_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00648_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bl00932_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\access12.acc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\boatinst.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\boat.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00076_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00078_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00092_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00078_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00135_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00136_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00100_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00145_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00174_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00184_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\aec.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\asset.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00200_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00186_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\aecutils.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00224_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00438_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\bhointl.dll".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00224_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00440_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00441_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00439_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00442_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\bstorm.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\calevent.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00443_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\cmaxres.dll".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00445_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00453_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00440_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs00444_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01080_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\dbengr.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01080_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\dataservices\folder.ico.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01634_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01635_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01603_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01636_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01637_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01638_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\bs01639_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\classic1.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\cg1606.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\classic2.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\dbwiz.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\discussion.gta.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\discussion14.gta.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\doorschd.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\crane.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\clip.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\cup.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\dwgcnv.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\cupinst.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00121_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\craninst.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00234_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\drilldwn.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00234_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00261_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\envelopr.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00255_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00117_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel.dev.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00297_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel.dev_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel.dev_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel.dev_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel.dev_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00256_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00405_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00372_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\excel_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00413_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00407_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00419_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\eqplist.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00414_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\gantt.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\facility.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\gantt.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\gr8galry.gra.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\floch.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\graph.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\graph_col.hxc".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\graph_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\graph_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00437_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\graph_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00449_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00448_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00687_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\graph_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\grintl32.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd00705_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\grintl32.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\groove.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\grooveintlresource.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01015_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01039_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01138_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01139_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01140_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\groove_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\groove_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\groove_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01143_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\groove_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01145_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01146_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01151_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01152_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01162_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01160_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01163_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01168_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01166_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01169_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01170_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01171_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01167_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01172_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01173_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01157_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01176_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01178_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01179_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\hvacduct.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01173_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01180_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01182_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopath.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01183_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01186_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01181_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopatheditor.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\hvac.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\hvacdiff.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01434_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01585_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01366_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01628_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01629_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopatheditor_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01586_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01586_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01630_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01630_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01631_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01761_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopatheditor_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01434_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopatheditor_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopath_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01793_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ed00010_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ed00019_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\dd01772_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopath_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopatheditor_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopath_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\infopath_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ed00184_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00006_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\inventry.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ipdsintl.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\issue tracking.gta.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\instlist.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\ed00172_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00222_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00202_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00319_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00397_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00242_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00320_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mor6int.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\move.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00074_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00076_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00086_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess.dev.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess.dev_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mapir.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\lgnd.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00077_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00090_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess.dev_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess.dev_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess.dev_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\en00902_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00096_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00296_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msaccess_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msouc_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msouc.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00306_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00361_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00297_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00336_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msouc_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msouc_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mso.acl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\msouc_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00369_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00397_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00382_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00403_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00414_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00419_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00403_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00428_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub.dev.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub.dev_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub.dev_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub.dev_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00438_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00455_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00459_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00435_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub.dev_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub.opg.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00543_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00564_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00586_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00775_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00544_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mspub_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mstore_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mstore_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mstore_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mstore_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\mstore.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00814_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00799_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00965_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01074_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00965_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd00779_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\network2.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\network3.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01084_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01176_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\offowci.dll".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01193_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\network1.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01191_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ois.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ois_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01548_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ois_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ois_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ois_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01196_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01196_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01657_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01657_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onenote.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onenote_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01660_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onenote_col.hxt".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\omsintl.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onenote_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01659_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onenote_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onintl.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onenote_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onintl.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02068_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd01658_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02071_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\onintl.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02075_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02088_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02097_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\orgchart.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\orgpos.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02141_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02153_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02158_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02116_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\orgwiz.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlbar.inf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02161_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outllibr.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outllibr.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook.dev.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook.dev_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outllibr.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00057_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00057_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook.dev_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\flap.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\orgch.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook.dev_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook.hol.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00231_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00235_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook.dev_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00084_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00236_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlwvw.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00260_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\fd02115_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00276_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\outlook_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00334_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00241_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00443_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pipeline.vrd".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00513_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00524_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00526_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00546_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00527_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pipeline.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pe.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pjintl.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt.dev.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt.dev_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt.dev_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt.dev_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00601_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt.dev_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\powerpnt_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ppintl.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00612_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00602_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00602_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00625_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\ppintl.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00623_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pub6intl.dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pub6intl.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00669_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pub6intl.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00636_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\proprpt.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00681_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pubcolor.scm.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00685_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00687_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00688_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh00693_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\pubwzint.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01015_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01058_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01013_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01065_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\savasweb.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01080_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01291_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01329_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01242_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\setlang_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\setlang_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01461_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01618_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\setlang.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01759_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\setlang_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01923_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh02155_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh02166_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01759_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh02282_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh01875_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\shapnum.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\sgres.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh02312_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh02298_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hh02313_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\setlang_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hm00114_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\space.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hm00116_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hm00172_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hm00005_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\smigrate.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hm00172_.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00118_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\timesoln.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\hm00426_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00177_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\uml.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00046_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00204_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00233_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00343_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00346_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00351_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\valve.vrd".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\valve.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visbrres.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00557_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\viscolor.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00957_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00919_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00956_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\in00915_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visintl.dll.idx_dll".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visintl.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086420.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.dev.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.dev_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086424.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.dev_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.dev_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086384.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.dev_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086426.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.shapesheet.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086428.wmf".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086428.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0075478.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086432.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0086478.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.shapesheet_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.shapesheet_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.shapesheet_f_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\clipart\pub60cor\j0089945.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
System Modification
VTI rule match with VTI rule score 1/5
vmray_modify_application_dir_by_file
Modifies "c:\program files\microsoft office\office14\1033\visio.shapesheet_k_col.hxk.id-9c354b42.[decrypt@qbmail.biz].pay".
Modifies application directory
Anti Analysis
VTI rule match with VTI rule score 2/5
vmray_detect_generic_vm_by_rdtsc
Possibly trying to detect VM via rdtsc.
Tries to detect virtual machine
System Modification
VTI rule match with VTI rule score 1/5
vmray_create_many_files
Creates above average number of files.
Creates an unusually large number of files
User Data Modification
VTI rule match with VTI rule score 4/5
vmray_modify_windows_backup_settings
Deletes Windows volume shadow copies.
Modifies Windows automatic backups
Antivirus
VTI rule match with VTI rule score 5/5
vmray_av_malicious_match
Local AV detected the sample itself as "Trojan.Ransom.Crysis.E".
Malicious content was detected by heuristic scan
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Boot\BOOTSTAT.DAT.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\BOOTSECT.BAK.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\OneNoteMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\VisioMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\GrooveMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\ProjectMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\OfficeMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\OfficeMUISet.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\branding.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\pss10r.chm.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\setup.chm.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\AccessMUI.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\AccessMUISet.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\branding.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\Office32WW.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\PrjProrWW.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\ProPlusrWW.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\Office32WW.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\VisiorWW.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.EPS.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.GIF.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\Office32WW.xml.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.JPG.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.PNG.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Access.en-us\AccessMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\1033\README.HTM.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Access.en-us\AccessMUISet.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Access.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Excel.en-us\ExcelMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Groove.en-us\GrooveMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Excel.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\InfoPath.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\InfoPath.en-us\InfoPathMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\OCT.CHM.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Groove.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\BRANDING.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\OfficeMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\OfficeMUISet.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\PSS10R.CHM.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\SETUP.CHM.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\PSS10O.CHM.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office.en-us\PSCONFIG.CHM.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office32.WW\Office32WW.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office32.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office32.en-us\Office32MUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Outlook.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Outlook.en-us\OutlookMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.msi.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\OneNote.en-us\OneNoteMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\OneNote.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\PowerPointMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Project.en-us\ProjectMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Project.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Proof.en\Proof.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Proof.es\Proof.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Proof.fr\Proof.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.msi.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\PRJPROR\PrjProrWW.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\PRJPROR\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Proofing.en-us\Proofing.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Publisher.en-us\PublisherMUI.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Proofing.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\PROPLUSR\ProPlusrWW.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Publisher.en-us\SETUP.XML.id-9C354B42.[decrypt@qbmail.biz].PAY".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\desktop.ini.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\msjet.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\informix.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\sql2000.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\as90.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\as80.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\sql90.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\sql70.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\resources\1033\msolui100.rll.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\resources\1033\msmdsrv.rll.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft analysis services\as oledb\10\cartridges\sybase.xsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\baby_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00037_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\east_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\cmnty_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00021_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\explr_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00038_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00040_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00011_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\carbn_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\fall_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\fincl_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00057_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00090_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\grid_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\fincl_02.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00092_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00052_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00004_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00120_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00103_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\indst_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00126_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\grden_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00139_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00135_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00129_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\java_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00130_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00142_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00154_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00157_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\jngle_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\htech_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\music_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00158_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00161_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\nbook_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ocean_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\outdr_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00160_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00164_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00163_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_02.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_03.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00165_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00167_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_04.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00169_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00170_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00171_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\paper_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_07.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00176_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_06.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_05.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00172_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00174_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_08.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ag00175_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_09.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\road_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\parnt_10.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an00853_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an00015_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an00010_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\schol_02.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\safri_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an00790_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an00965_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\show_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an00914_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01039_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\sprng_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\space_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01044_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\swest_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an00932_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01173_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01084_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\sumer_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01060_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\urban_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01174_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\wnter_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01184_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01218_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01216_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01545_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an01251_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an02724_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an02559_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an02122_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04108_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an03500_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04117_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04134_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\vctrn_01.mid.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04191_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\adjacency.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04195_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04196_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\apex.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\angles.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04206_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04174_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\apothecary.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04225_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04235_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\aspect.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04267_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04269_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04326_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04323_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04355_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04332_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04369_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04385_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\clarity.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd00116_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\an04384_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\austin.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\black tie.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\civic.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd00155_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd00141_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\concourse.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd00160_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd00173_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd05119_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd00146_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\elemental.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\composite.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\equity.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd06102_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd06200_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd07804_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd07761_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd08773_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd08808_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd08758_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd07831_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\foundry.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd09194_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\executive.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\flow.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\essential.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd08868_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd09031_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd09664_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\grid.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd09662_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\median.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd10890_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\hardcover.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\horizon.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\metro.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\newsprint.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\module.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd19563_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd19695_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd19827_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd10972_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd19582_.gif.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd19988_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd19986_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd19828_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\origin.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\opulent.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bd20013_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00008_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\paper.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00098_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\perspective.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\oriel.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00045_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\slipstream.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\solstice.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\technic.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00122_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00105_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00152_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00012_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\pushpin.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\urban.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00148_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00130_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00194_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00234_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00195_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00242_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00247_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00248_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\thatch.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\waveform.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\verve.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\document themes 14\theme effects\trek.eftx.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00252_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00261_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00254_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00265_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00262_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00267_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00269_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00273_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00270_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00274_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00296_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00392_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00390_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00526_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00525_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\media\cagcat10\cagcat10.mmw.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\media\office14\1033\office10.mml.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00648_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00524_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00921_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00923_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00985_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\media\cagcat10\1033\cagcat10.mml.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\boat.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00076_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\boatinst.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\media\office14\office10.mmw.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00092_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00078_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bl00932_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00100_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00136_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00135_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00145_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00174_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00184_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\aec.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\asset.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00200_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00186_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00438_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00224_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\aecutils.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00440_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\bstorm.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\calevent.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00441_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00439_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00442_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00453_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\access12.acc.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00443_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00445_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\dbengr.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs00444_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01634_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01635_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01603_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01080_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01637_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01638_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01639_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\bs01636_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\classic1.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\dataservices\folder.ico.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\cg1606.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\classic2.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\discussion.gta.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\dbwiz.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\doorschd.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\discussion14.gta.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\crane.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\clip.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\cup.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\cupinst.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\craninst.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00234_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\dwgcnv.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00121_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\drilldwn.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00261_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\envelopr.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00255_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\excel.dev_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00117_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00405_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00372_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00297_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\excel.dev_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00256_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\excel_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\excel_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\eqplist.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00413_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\facility.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\gantt.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00407_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\gantt.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\floch.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00419_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\gr8galry.gra.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00414_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\graph_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\graph_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00437_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00449_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00687_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\grintl32.rest.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\graph.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00448_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\grintl32.dll.idx_dll.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd00705_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01039_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01138_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\groove_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01139_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01143_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01140_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01015_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01146_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01151_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01145_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\groove_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01152_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01160_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01163_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01162_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01168_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01166_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01169_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01170_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01167_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01171_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01172_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01157_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01176_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\hvacduct.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01173_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01180_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01179_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01178_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01182_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01181_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\hvac.vsl.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\hvacdiff.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01183_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01186_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01585_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01366_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01628_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\infopatheditor.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01630_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01586_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01629_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01631_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\infopath.hxs.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01761_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01434_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\infopath_col.hxc.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01793_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ed00010_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ed00019_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\dd01772_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\infopath_col.hxt.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ed00184_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\en00006_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\inventry.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\instlist.vrd.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\office14\1033\issue tracking.gta.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules
YARA
VTI rule match with VTI rule score 5/5
vmray_yara_match_high
Rule "DharmaEncryptedFile" from ruleset "Ransomware" has matched on the dropped file "c:\users\5p5nrgjn0js halpmcxz\appdata\local\virtualstore\program files\microsoft office\clipart\pub60cor\ed00172_.wmf.id-9c354b42.[decrypt@qbmail.biz].pay".
Malicious content matched by YARA rules