Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00405FF5 FindFirstFileA,FindClose, | 0_2_00405FF5 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 0_2_004055B1 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00402645 FindFirstFileA, | 0_2_00402645 |
Source: C:\Users\user\Desktop\word.exe | Code function: 21_2_00402645 FindFirstFileA, | 21_2_00402645 |
Source: C:\Users\user\Desktop\word.exe | Code function: 21_2_00405FF5 FindFirstFileA,FindClose, | 21_2_00405FF5 |
Source: C:\Users\user\Desktop\word.exe | Code function: 21_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 21_2_004055B1 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0 |
Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://certificate.crt/ |
Source: word.exe, 00000015.00000002.5970737373.0000000007866000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certificate.crt/localhosthttp://localhost/7 |
Source: word.exe, 00000015.00000002.5970737373.0000000007866000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certificate.crt/localhostsihttp://localhost/o |
Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0 |
Source: word.exe, word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: word.exe, 00000000.00000000.860411221.0000000000409000.00000008.00000001.01000000.00000003.sdmp, word.exe, 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmp, word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsps.ssl.com0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsps.ssl.com0? |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsps.ssl.com0_ |
Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.quovadis.bm0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0 |
Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://186.2.171.76/agent.ashx |
Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://186.2.171.76/agent.ashx$ |
Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://186.2.171.76/agent.ashxP |
Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ocsp.quovadisoffshore.com0 |
Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ssl.com/repository0 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_0040511A GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_0040511A |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess, | 0_2_00403217 |
Source: C:\Users\user\Desktop\word.exe | Code function: 21_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess, | 21_2_00403217 |
Source: C:\Users\user\Desktop\word.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ncryptprov.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: netfxperf.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: bitsperf.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: esentprf.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: perfts.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: utildll.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: tdh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: msdtcuiu.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: msdtcprx.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: mtxclu.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: clusapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: resutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: ktmw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: msscntrs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: perfdisk.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wmiclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: perfnet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: browcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: perfos.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: perfproc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: sysmain.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: rasctrs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: tapiperf.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: perfctrs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: usbperf.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00405FF5 FindFirstFileA,FindClose, | 0_2_00405FF5 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 0_2_004055B1 |
Source: C:\Users\user\Desktop\word.exe | Code function: 0_2_00402645 FindFirstFileA, | 0_2_00402645 |
Source: C:\Users\user\Desktop\word.exe | Code function: 21_2_00402645 FindFirstFileA, | 21_2_00402645 |
Source: C:\Users\user\Desktop\word.exe | Code function: 21_2_00405FF5 FindFirstFileA,FindClose, | 21_2_00405FF5 |
Source: C:\Users\user\Desktop\word.exe | Code function: 21_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 21_2_004055B1 |
Source: word.exe, 00000015.00000003.1824336160.000000003A0C3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V Virtual Machine Bus |
Source: word.exe, 00000015.00000003.1824336160.000000003A0C3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V Dynamic Memory Integration Service |
Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: q!Hyper-V Hypervisor Root Partition |
Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: q*Hyper-V Dynamic Memory Integration Service |
Source: word.exe, 00000015.00000003.1818293472.000000003C7C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: THyper-V Hypervisor Root Virtual Processor |
Source: word.exe, 00000015.00000003.1819484760.000000003C793000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000003.1822603900.000000003C793000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X2Hyper-V VM Vid Partitiona |
Source: word.exe, 00000015.00000003.1822177141.000000003C91C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %u<WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Process |
Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: q$Hyper-V Hypervisor Logical Processor |
Source: word.exe, 00000015.00000003.1821690930.000000003C7F0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot |
Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: q!Hyper-V Virtual Machine Bus Pipes |
Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: q)Hyper-V Hypervisor Root Virtual Processor |
Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Hyper-V Hypervisor |
Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Hyper-V VM Vid Partition |
Source: word.exe, 00000015.00000003.1826101326.000000003A0B4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VHyper-V Dynamic Memory Integration Servicelm |
Source: word.exe, 00000015.00000003.1824336160.000000003A0C3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V Virtual Machine Bus Pipes' |