Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdb source: Editing.exe, 00000000.00000002.3216088459.00000284D09B0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216068311.00000284D09A1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Xml.ReaderWriter\Release\net8.0\System.Xml.ReaderWriter.pdbSHA256I source: Editing.exe, 00000000.00000002.3213973895.00000284CFAF1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214871433.00000284CFF50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.Sockets.ni.pdb source: Editing.exe, 00000000.00000002.3214572685.00000284CFE30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214620254.00000284CFE71000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Collections.Concurrent.ni.pdb source: Editing.exe, 00000000.00000002.3214300596.00000284CFC41000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214325112.00000284CFC60000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Private.Xml\Release\net8.0-windows\System.Private.Xml.pdb source: Editing.exe, 00000000.00000002.3215619881.00000284D0541000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215366959.00000284D0240000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.FileSystem.DriveInfo\Release\net8.0-windows\System.IO.FileSystem.DriveInfo.pdb source: Editing.exe, 00000000.00000002.3212455724.00000284CCAC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212473659.00000284CCAD0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.IO.FileSystem.DriveInfo.ni.pdb source: Editing.exe, 00000000.00000002.3212455724.00000284CCAC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212473659.00000284CCAD0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Diagnostics.Process.ni.pdb source: Editing.exe, 00000000.00000002.3212183576.00000284CC9D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212225709.00000284CCA01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.ComponentModel.Primitives.ni.pdb source: Editing.exe, 00000000.00000002.3212165209.00000284CC9C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212254148.00000284CCA30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Private.Uri.ni.pdb source: Editing.exe, 00000000.00000002.3214257265.00000284CFC20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214057906.00000284CFB01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.DiagnosticSource\Release\net8.0\System.Diagnostics.DiagnosticSource.pdbSHA256P?> source: Editing.exe, 00000000.00000002.3214089010.00000284CFB20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214140885.00000284CFB51000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Win32.Registry.ni.pdb source: Editing.exe, 00000000.00000002.3215940910.00000284D08D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3211154010.0000024437CD1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Security.Cryptography\Release\net8.0-windows\System.Security.Cryptography.pdb source: Editing.exe, 00000000.00000002.3214347772.00000284CFC80000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214432901.00000284CFD41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections\Release\net8.0\System.Collections.pdb source: Editing.exe, 00000000.00000002.3214846387.00000284CFF31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214801607.00000284CFF10000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: :C:\Users\user\AppData\Local\Temp\fri53hgi\fri53hgi.pdbhP source: powershell.exe, 00000004.00000002.2191077266.0000020A63B94000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Serialization.Primitives\Release\net8.0\System.Runtime.Serialization.Primitives.pdb source: Editing.exe, 00000000.00000002.3215131916.00000284D0141000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215153387.00000284D0150000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.Security.ni.pdb source: Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214169569.00000284CFB80000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Console\Release\net8.0-windows\System.Console.pdb source: Editing.exe, 00000000.00000002.3212975104.00000284CD0C0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212597286.00000284CCB11000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Security.Principal.Windows.ni.pdb source: Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212307083.00000284CCA50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections.NonGeneric\Release\net8.0\System.Collections.NonGeneric.pdb source: Editing.exe, 00000000.00000002.3216283839.00000284D0A30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216261389.00000284D0A21000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Overlapped\Release\net8.0\System.Threading.Overlapped.pdbSHA256t source: Editing.exe, 00000000.00000002.3214531779.00000284CFE11000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214552955.00000284CFE20000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\dlls\mscordac\mscordaccore.pdb source: Editing.exe, Editing.exe, 00000000.00000002.3236670998.00007FF647018000.00000002.00000001.01000000.00000003.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections.Concurrent\Release\net8.0\System.Collections.Concurrent.pdb source: Editing.exe, 00000000.00000002.3214300596.00000284CFC41000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214325112.00000284CFC60000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Security\Release\net8.0-windows\System.Net.Security.pdbSHA256 source: Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214169569.00000284CFB80000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\Microsoft.Win32.Registry\Release\net8.0-windows\Microsoft.Win32.Registry.pdb source: Editing.exe, 00000000.00000002.3215940910.00000284D08D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3211154010.0000024437CD1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.NameResolution\Release\net8.0-windows\System.Net.NameResolution.pdb source: Editing.exe, 00000000.00000002.3214735866.00000284CFED0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214672966.00000284CFEB1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.DiagnosticSource\Release\net8.0\System.Diagnostics.DiagnosticSource.pdb source: Editing.exe, 00000000.00000002.3214089010.00000284CFB20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214140885.00000284CFB51000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Linq\Release\net8.0\System.Linq.pdb source: Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215234136.00000284D0180000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Collections.NonGeneric.ni.pdb source: Editing.exe, 00000000.00000002.3216283839.00000284D0A30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216261389.00000284D0A21000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.Process\Release\net8.0-windows\System.Diagnostics.Process.pdb source: Editing.exe, 00000000.00000002.3212183576.00000284CC9D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212225709.00000284CCA01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Linq.ni.pdb source: Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215234136.00000284D0180000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Overlapped\Release\net8.0\System.Threading.Overlapped.pdb source: Editing.exe, 00000000.00000002.3214531779.00000284CFE11000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214552955.00000284CFE20000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.Tracing\Release\net8.0\System.Diagnostics.Tracing.pdb source: Editing.exe, 00000000.00000002.3213935450.00000284CFAE0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3213770399.00000284CF971000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Memory.ni.pdb source: Editing.exe, 00000000.00000002.3216145339.00000284D09D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212913296.00000284CCFC8000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216549510.00000284D0E41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\Microsoft.Win32.Primitives\Release\net8.0\Microsoft.Win32.Primitives.pdb source: Editing.exe, 00000000.00000002.3214493572.00000284CFE00000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3210892163.00000244364D1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\Release\net8.0\System.Reflection.Primitives.pdb source: Editing.exe, 00000000.00000002.3215920817.00000284D08B0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3215900196.00000284D08A1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Private.DataContractSerialization.ni.pdb source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdb source: Editing.exe, 00000000.00000002.3214715169.00000284CFEC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214755813.00000284CFEE0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Security\Release\net8.0-windows\System.Net.Security.pdb source: Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214169569.00000284CFB80000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Collections.ni.pdb source: Editing.exe, 00000000.00000002.3214846387.00000284CFF31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214801607.00000284CFF10000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Http\Release\net8.0-windows\System.Net.Http.pdbSHA256 source: Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213789653.00000284CF980000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Private.CoreLib.ni.pdb source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Management/Release/net8.0-windows/System.Management.pdbSHA256 source: Editing.exe, 00000000.00000002.3215961512.00000284D08F0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216014096.00000284D0941000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Loader\Release\net8.0\System.Runtime.Loader.pdb source: Editing.exe, 00000000.00000002.3214912074.00000284CFF61000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215091691.00000284D0130000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Private.Uri\Release\net8.0\System.Private.Uri.pdb source: Editing.exe, 00000000.00000002.3214257265.00000284CFC20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214057906.00000284CFB01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Primitives\Release\net8.0-windows\System.Net.Primitives.pdb source: Editing.exe, 00000000.00000002.3213703627.00000284CF931000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213728975.00000284CF950000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Security.Cryptography.ni.pdb source: Editing.exe, 00000000.00000002.3214347772.00000284CFC80000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214432901.00000284CFD41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Private.Xml.ni.pdb source: Editing.exe, 00000000.00000002.3215619881.00000284D0541000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215366959.00000284D0240000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Collections.Specialized.ni.pdb source: Editing.exe, 00000000.00000002.3216124709.00000284D09C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216165832.00000284D09E0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Xml.ReaderWriter\Release\net8.0\System.Xml.ReaderWriter.pdb source: Editing.exe, 00000000.00000002.3213973895.00000284CFAF1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214871433.00000284CFF50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Emit.ILGeneration\Release\net8.0\System.Reflection.Emit.ILGeneration.pdb source: Editing.exe, 00000000.00000002.3215193208.00000284D0161000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215214561.00000284D0170000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Runtime.Serialization.Primitives.ni.pdb source: Editing.exe, 00000000.00000002.3215131916.00000284D0141000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215153387.00000284D0150000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Runtime.InteropServices.ni.pdb source: Editing.exe, 00000000.00000002.3212402002.00000284CCAA1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212420646.00000284CCAB0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Linq\Release\net8.0\System.Linq.pdbSHA256R source: Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215234136.00000284D0180000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading\Release\net8.0\System.Threading.pdb source: Editing.exe, 00000000.00000002.3212506695.00000284CCAE1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212526014.00000284CCAF0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Private.DataContractSerialization/Release/net8.0/System.Private.DataContractSerialization.pdb source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdbSHA256 source: Editing.exe, 00000000.00000002.3216088459.00000284D09B0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216068311.00000284D09A1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Text.RegularExpressions.ni.pdb source: Editing.exe, 00000000.00000002.3215328342.00000284D01E1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215842835.00000284D0840000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Security.Claims.ni.pdb source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\Corehost.Static\singlefilehost.pdb source: Editing.exe |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Http\Release\net8.0-windows\System.Net.Http.pdb source: Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213789653.00000284CF980000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\System.Private.CoreLib\x64\Release\System.Private.CoreLib.pdb source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Serialization.Primitives\Release\net8.0\System.Runtime.Serialization.Primitives.pdbSHA256 source: Editing.exe, 00000000.00000002.3215131916.00000284D0141000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215153387.00000284D0150000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Memory\Release\net8.0\System.Memory.pdb source: Editing.exe, 00000000.00000002.3216145339.00000284D09D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212913296.00000284CCFC8000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216549510.00000284D0E41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Emit.ILGeneration\Release\net8.0\System.Reflection.Emit.ILGeneration.pdbSHA256 source: Editing.exe, 00000000.00000002.3215193208.00000284D0161000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215214561.00000284D0170000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.ComponentModel.Primitives\Release\net8.0\System.ComponentModel.Primitives.pdb source: Editing.exe, 00000000.00000002.3212165209.00000284CC9C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212254148.00000284CCA30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.ServicePoint\Release\net8.0\System.Net.ServicePoint.pdbSHA256 source: Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Net.NameResolution.ni.pdb source: Editing.exe, 00000000.00000002.3214735866.00000284CFED0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214672966.00000284CFEB1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Console.ni.pdb source: Editing.exe, 00000000.00000002.3212975104.00000284CD0C0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212597286.00000284CCB11000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Sockets\Release\net8.0-windows\System.Net.Sockets.pdb source: Editing.exe, 00000000.00000002.3214572685.00000284CFE30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214620254.00000284CFE71000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Security.Claims\Release\net8.0\System.Security.Claims.pdb source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Diagnostics.DiagnosticSource.ni.pdb source: Editing.exe, 00000000.00000002.3214089010.00000284CFB20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214140885.00000284CFB51000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Net.Http.ni.pdb source: Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213789653.00000284CF980000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Threading.ni.pdb source: Editing.exe, 00000000.00000002.3212506695.00000284CCAE1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212526014.00000284CCAF0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdb source: Editing.exe, 00000000.00000002.3211317727.0000024437D40000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3211294592.0000024437D31000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: :C:\Users\user\AppData\Local\Temp\fri53hgi\fri53hgi.pdb source: powershell.exe, 00000004.00000002.2191077266.0000020A63B94000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.InteropServices\Release\net8.0\System.Runtime.InteropServices.pdb source: Editing.exe, 00000000.00000002.3212402002.00000284CCAA1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212420646.00000284CCAB0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.ServicePoint.ni.pdb source: Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections.Specialized\Release\net8.0\System.Collections.Specialized.pdb source: Editing.exe, 00000000.00000002.3216124709.00000284D09C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216165832.00000284D09E0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.ServicePoint\Release\net8.0\System.Net.ServicePoint.pdb source: Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.RegularExpressions\Release\net8.0\System.Text.RegularExpressions.pdb source: Editing.exe, 00000000.00000002.3215328342.00000284D01E1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215842835.00000284D0840000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Security.Principal.Windows\Release\net8.0-windows\System.Security.Principal.Windows.pdb source: Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212307083.00000284CCA50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdbSHA2560 source: Editing.exe, 00000000.00000002.3214715169.00000284CFEC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214755813.00000284CFEE0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.Primitives.ni.pdb source: Editing.exe, 00000000.00000002.3213703627.00000284CF931000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213728975.00000284CF950000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Management/Release/net8.0-windows/System.Management.pdb source: Editing.exe, 00000000.00000002.3215961512.00000284D08F0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216014096.00000284D0941000.00000020.00001000.00020000.00000000.sdmp |
Source: Editing.exe | String found in binary or memory: http://.css |
Source: Editing.exe | String found in binary or memory: http://.jpg |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A820000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://89.23.97.214/TeamBuild/win32_svchost.exe |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A800000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://89.23.97.214/TeamBuild/win32_svchost.exehttp://89.23.97.214/TeamBuild/win64_svchost.exewin32s |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A820000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://89.23.97.214/TeamBuild/win64_svchost.exe |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A87A000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://89.23.97.214:80/ |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A820000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A820000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org/ |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A820000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org:80/ |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A800000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.orgnotification_sent.flag |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3211502508.000002443A8A2000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://api.telegram.org:443/ |
Source: powershell.exe, 0000000A.00000002.2404365752.000001E2F6E4B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.mic |
Source: powershell.exe, 0000000A.00000002.2404365752.000001E2F6E4B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micft.cMicRosof |
Source: powershell.exe, 0000000A.00000002.2404365752.000001E2F6E4B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microso |
Source: Editing.exe, 00000000.00000002.3215366959.00000284D0252000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://exslt.org/common |
Source: Editing.exe | String found in binary or memory: http://html4/loose.dtd |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A800000.00000004.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3211502508.000002443A80B000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/json/ |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A800000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/json/8 |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A80B000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/json/8.46.123.189 |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com:80/ |
Source: Editing.exe, 00000000.00000003.2461137442.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000003.2986571369.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000003.3198834558.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000003.2460845546.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000003.2728016609.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000003.2985277080.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000003.3198606604.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000003.3198401533.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216305101.00000284D0B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://microsoft.co |
Source: powershell.exe, 00000002.00000002.2224756243.000002B11B271000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2269834300.0000020A726D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2380127260.000001E290070000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000004.00000002.2191077266.0000020A63AFC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pastebin.com |
Source: powershell.exe, 0000000A.00000002.2300636832.000001E280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213329028.00000284CD5B0000.00000004.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/ |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/NETdesign.Plugin.Notifer |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.IO |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.Runtime.Serialization |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.Xml |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.Xml.Linq |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/SystemV |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/SystemY |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/dhttp://schemas.datacontract.org/2004/07/System.XmlRhttp://w |
Source: powershell.exe, 00000002.00000002.2184575792.000002B10B428000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2300636832.000001E280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005 |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212307083.00000284CCA50000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200 |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone |
Source: Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212307083.00000284CCA50000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3213329028.00000284CD5B0000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2184575792.000002B10B201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2191077266.0000020A62521000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2300636832.000001E280001000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/ |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20 |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/ |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamevhttp://schemas.xmlsoap.o |
Source: Editing.exe, 00000000.00000002.3215366959.00000284D0252000.00000004.10000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.2184575792.000002B10B428000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2300636832.000001E280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: powershell.exe, 0000000A.00000002.2300636832.000001E280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 0000000A.00000002.2404365752.000001E2F6E4B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft.coW |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://aka.ms/GlobalizationInvariantMode |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCC93000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212913296.00000284CCFD6000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215961512.00000284D08F0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216014096.00000284D0941000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/binaryformatter |
Source: Editing.exe | String found in binary or memory: https://aka.ms/dotnet-core-applaunch? |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCC93000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://aka.ms/dotnet-illink/com |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCC93000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://aka.ms/dotnet-illink/nativehost |
Source: Editing.exe, 00000000.00000002.3212619407.00000284CCC93000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://aka.ms/dotnet-illink/nativehostt |
Source: Editing.exe, 00000000.00000002.3214432901.00000284CFD41000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/dotnet-warnings/ |
Source: Editing.exe | String found in binary or memory: https://aka.ms/dotnet/app-launch-failed |
Source: Editing.exe | String found in binary or memory: https://aka.ms/dotnet/download |
Source: Editing.exe | String found in binary or memory: https://aka.ms/dotnet/download%s%sInstall |
Source: Editing.exe | String found in binary or memory: https://aka.ms/dotnet/info |
Source: Editing.exe | String found in binary or memory: https://aka.ms/dotnet/sdk-not-foundProbing |
Source: Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://aka.ms/nativeaot-compatibility |
Source: powershell.exe, 00000002.00000002.2184575792.000002B10B201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2191077266.0000020A62521000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2300636832.000001E280001000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: Editing.exe, 00000000.00000002.3212913296.00000284CCFD6000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215961512.00000284D08F0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216014096.00000284D0941000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/serializationformat-binary-obsolete |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A800000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3211502508.000002443A8A2000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7877511610:AAFUatIaHUDXQJtLE_epVwwwm3che0AiuJY/sendMessage |
Source: Editing.exe, 00000000.00000002.3211502508.000002443A843000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7877511610:AAFUatIaHUDXQJtLE_epVwwwm3che0AiuJY/sendMessage?chat_id=-1002 |
Source: powershell.exe, 0000000A.00000002.2380127260.000001E290070000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 0000000A.00000002.2380127260.000001E290070000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 0000000A.00000002.2380127260.000001E290070000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 0000000A.00000002.2300636832.000001E280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: Editing.exe, 00000000.00000002.3215328342.00000284D01E1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215842835.00000284D0840000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/dotnet/linker/issues/2715. |
Source: Editing.exe, 00000000.00000002.3215366959.00000284D0252000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214846387.00000284CFF31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216283839.00000284D0A30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216261389.00000284D0A21000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214531779.00000284CFE11000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213703627.00000284CF931000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212975104.00000284CD0C0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214912074.00000284CFF61000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213973895.00000284CFAF1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212402002.00000284CCAA1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213935450.00000284CFAE0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3215091691.00000284D0130000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216124709.00000284D09C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213728975.00000284CF950000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/dotnet/runtime |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/ |
Source: Editing.exe, 00000000.00000002.3215366959.00000284D0252000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/dotnet/runtime/issues/50820 |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/dotnet/runtime/issues/71847 |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mono/linker/issues/378 |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mono/linker/pull/649 |
Source: powershell.exe, 00000004.00000002.2191077266.0000020A63153000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000002.00000002.2224756243.000002B11B271000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2269834300.0000020A726D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2380127260.000001E290070000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000004.00000002.2191077266.0000020A63153000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com |
Source: powershell.exe, 00000004.00000002.2188700328.0000020A608D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/raw/WHKzW2nr |
Source: Editing.exe | Binary or memory string: OriginalFilename vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214846387.00000284CFF31000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216283839.00000284D0A30000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.NonGeneric.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216261389.00000284D0A21000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.NonGeneric.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Security.Claims.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Security.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Http.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214531779.00000284CFE11000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.Overlapped.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216610266.00000284D1481000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.SystemEvents.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213703627.00000284CF931000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Linq.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212975104.00000284CD0C0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Console.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214912074.00000284CFF61000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.Loader.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.ServicePoint.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Security.Principal.Windows.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213973895.00000284CFAF1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Xml.ReaderWriter.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212402002.00000284CCAA1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.ServicePoint.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213935450.00000284CFAE0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Diagnostics.Tracing.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215091691.00000284D0130000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.Loader.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216124709.00000284D09C1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.Specialized.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213728975.00000284CF950000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215328342.00000284D01E1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Text.RegularExpressions.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214871433.00000284CFF50000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Xml.ReaderWriter.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212420646.00000284CCAB0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214801607.00000284CFF10000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214169569.00000284CFB80000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Security.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216145339.00000284D09D0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Memory.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212165209.00000284CC9C1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.ComponentModel.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212109314.00000284CC9A1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameNETdesign.dll4 vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212130123.00000284CC9B0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameNETdesign.dll4 vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212506695.00000284CCAE1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.DataContractSerialization.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215193208.00000284D0161000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Reflection.Emit.ILGeneration.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214089010.00000284CFB20000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Diagnostics.DiagnosticSource.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212307083.00000284CCA50000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Security.Principal.Windows.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3211198846.0000024437CF2000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameWorkTeam.dll2 vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3211317727.0000024437D40000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216088459.00000284D09B0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.Thread.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214347772.00000284CFC80000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Security.Cryptography.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214493572.00000284CFE00000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214257265.00000284CFC20000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.Uri.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214140885.00000284CFB51000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Diagnostics.DiagnosticSource.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212455724.00000284CCAC1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.IO.FileSystem.DriveInfo.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214552955.00000284CFE20000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.Overlapped.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215920817.00000284D08B0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Reflection.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3211294592.0000024437D31000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216165832.00000284D09E0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.Specialized.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216068311.00000284D09A1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.Thread.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214715169.00000284CFEC1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.ThreadPool.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214755813.00000284CFEE0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.ThreadPool.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213770399.00000284CF971000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Diagnostics.Tracing.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Security.Claims.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212473659.00000284CCAD0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.IO.FileSystem.DriveInfo.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214735866.00000284CFED0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.NameResolution.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214057906.00000284CFB01000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.Uri.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214300596.00000284CFC41000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.Concurrent.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3236670998.00007FF647018000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamemscordaccore.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3236670998.00007FF647018000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameWorkTeam.dll2 vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215842835.00000284D0840000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Text.RegularExpressions.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215131916.00000284D0141000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.Serialization.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215214561.00000284D0170000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Reflection.Emit.ILGeneration.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215940910.00000284D08D0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.Registry.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3210892163.00000244364D1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215619881.00000284D0541000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.Xml.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214572685.00000284CFE30000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Sockets.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212597286.00000284CCB11000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Console.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3213789653.00000284CF980000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Http.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215234136.00000284D0180000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Linq.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3211154010.0000024437CD1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.Registry.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214672966.00000284CFEB1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.NameResolution.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215153387.00000284D0150000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Runtime.Serialization.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215961512.00000284D08F0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Management.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215366959.00000284D0240000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.Xml.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216014096.00000284D0941000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Management.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212913296.00000284CCFC8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Memory.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214620254.00000284CFE71000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Net.Sockets.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212526014.00000284CCAF0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Threading.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3216549510.00000284D0E41000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Memory.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212254148.00000284CCA30000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.ComponentModel.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214432901.00000284CFD41000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Security.Cryptography.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212183576.00000284CC9D0000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Diagnostics.Process.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3215900196.00000284D08A1000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Reflection.Primitives.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Private.DataContractSerialization.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3212225709.00000284CCA01000.00000020.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Diagnostics.Process.dll@ vs Editing.exe |
Source: Editing.exe, 00000000.00000002.3214325112.00000284CFC60000.00000004.10000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameSystem.Collections.Concurrent.dll@ vs Editing.exe |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: icu.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: wshunix.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ Editing.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdb source: Editing.exe, 00000000.00000002.3216088459.00000284D09B0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216068311.00000284D09A1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Xml.ReaderWriter\Release\net8.0\System.Xml.ReaderWriter.pdbSHA256I source: Editing.exe, 00000000.00000002.3213973895.00000284CFAF1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214871433.00000284CFF50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.Sockets.ni.pdb source: Editing.exe, 00000000.00000002.3214572685.00000284CFE30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214620254.00000284CFE71000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Collections.Concurrent.ni.pdb source: Editing.exe, 00000000.00000002.3214300596.00000284CFC41000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214325112.00000284CFC60000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Private.Xml\Release\net8.0-windows\System.Private.Xml.pdb source: Editing.exe, 00000000.00000002.3215619881.00000284D0541000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215366959.00000284D0240000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.FileSystem.DriveInfo\Release\net8.0-windows\System.IO.FileSystem.DriveInfo.pdb source: Editing.exe, 00000000.00000002.3212455724.00000284CCAC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212473659.00000284CCAD0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.IO.FileSystem.DriveInfo.ni.pdb source: Editing.exe, 00000000.00000002.3212455724.00000284CCAC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212473659.00000284CCAD0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Diagnostics.Process.ni.pdb source: Editing.exe, 00000000.00000002.3212183576.00000284CC9D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212225709.00000284CCA01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.ComponentModel.Primitives.ni.pdb source: Editing.exe, 00000000.00000002.3212165209.00000284CC9C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212254148.00000284CCA30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Private.Uri.ni.pdb source: Editing.exe, 00000000.00000002.3214257265.00000284CFC20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214057906.00000284CFB01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.DiagnosticSource\Release\net8.0\System.Diagnostics.DiagnosticSource.pdbSHA256P?> source: Editing.exe, 00000000.00000002.3214089010.00000284CFB20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214140885.00000284CFB51000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Win32.Registry.ni.pdb source: Editing.exe, 00000000.00000002.3215940910.00000284D08D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3211154010.0000024437CD1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Security.Cryptography\Release\net8.0-windows\System.Security.Cryptography.pdb source: Editing.exe, 00000000.00000002.3214347772.00000284CFC80000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214432901.00000284CFD41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections\Release\net8.0\System.Collections.pdb source: Editing.exe, 00000000.00000002.3214846387.00000284CFF31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214801607.00000284CFF10000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: :C:\Users\user\AppData\Local\Temp\fri53hgi\fri53hgi.pdbhP source: powershell.exe, 00000004.00000002.2191077266.0000020A63B94000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Serialization.Primitives\Release\net8.0\System.Runtime.Serialization.Primitives.pdb source: Editing.exe, 00000000.00000002.3215131916.00000284D0141000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215153387.00000284D0150000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.Security.ni.pdb source: Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214169569.00000284CFB80000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Console\Release\net8.0-windows\System.Console.pdb source: Editing.exe, 00000000.00000002.3212975104.00000284CD0C0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212597286.00000284CCB11000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Security.Principal.Windows.ni.pdb source: Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212307083.00000284CCA50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections.NonGeneric\Release\net8.0\System.Collections.NonGeneric.pdb source: Editing.exe, 00000000.00000002.3216283839.00000284D0A30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216261389.00000284D0A21000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Overlapped\Release\net8.0\System.Threading.Overlapped.pdbSHA256t source: Editing.exe, 00000000.00000002.3214531779.00000284CFE11000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214552955.00000284CFE20000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\dlls\mscordac\mscordaccore.pdb source: Editing.exe, Editing.exe, 00000000.00000002.3236670998.00007FF647018000.00000002.00000001.01000000.00000003.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections.Concurrent\Release\net8.0\System.Collections.Concurrent.pdb source: Editing.exe, 00000000.00000002.3214300596.00000284CFC41000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214325112.00000284CFC60000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Security\Release\net8.0-windows\System.Net.Security.pdbSHA256 source: Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214169569.00000284CFB80000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\Microsoft.Win32.Registry\Release\net8.0-windows\Microsoft.Win32.Registry.pdb source: Editing.exe, 00000000.00000002.3215940910.00000284D08D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3211154010.0000024437CD1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.NameResolution\Release\net8.0-windows\System.Net.NameResolution.pdb source: Editing.exe, 00000000.00000002.3214735866.00000284CFED0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214672966.00000284CFEB1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.DiagnosticSource\Release\net8.0\System.Diagnostics.DiagnosticSource.pdb source: Editing.exe, 00000000.00000002.3214089010.00000284CFB20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214140885.00000284CFB51000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Linq\Release\net8.0\System.Linq.pdb source: Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215234136.00000284D0180000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Collections.NonGeneric.ni.pdb source: Editing.exe, 00000000.00000002.3216283839.00000284D0A30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216261389.00000284D0A21000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.Process\Release\net8.0-windows\System.Diagnostics.Process.pdb source: Editing.exe, 00000000.00000002.3212183576.00000284CC9D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212225709.00000284CCA01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Linq.ni.pdb source: Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215234136.00000284D0180000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Overlapped\Release\net8.0\System.Threading.Overlapped.pdb source: Editing.exe, 00000000.00000002.3214531779.00000284CFE11000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214552955.00000284CFE20000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.Tracing\Release\net8.0\System.Diagnostics.Tracing.pdb source: Editing.exe, 00000000.00000002.3213935450.00000284CFAE0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3213770399.00000284CF971000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Memory.ni.pdb source: Editing.exe, 00000000.00000002.3216145339.00000284D09D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212913296.00000284CCFC8000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216549510.00000284D0E41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\Microsoft.Win32.Primitives\Release\net8.0\Microsoft.Win32.Primitives.pdb source: Editing.exe, 00000000.00000002.3214493572.00000284CFE00000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3210892163.00000244364D1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\Release\net8.0\System.Reflection.Primitives.pdb source: Editing.exe, 00000000.00000002.3215920817.00000284D08B0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3215900196.00000284D08A1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Private.DataContractSerialization.ni.pdb source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdb source: Editing.exe, 00000000.00000002.3214715169.00000284CFEC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214755813.00000284CFEE0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Security\Release\net8.0-windows\System.Net.Security.pdb source: Editing.exe, 00000000.00000002.3214222078.00000284CFBD1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214169569.00000284CFB80000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Collections.ni.pdb source: Editing.exe, 00000000.00000002.3214846387.00000284CFF31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214801607.00000284CFF10000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Http\Release\net8.0-windows\System.Net.Http.pdbSHA256 source: Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213789653.00000284CF980000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Private.CoreLib.ni.pdb source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Management/Release/net8.0-windows/System.Management.pdbSHA256 source: Editing.exe, 00000000.00000002.3215961512.00000284D08F0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216014096.00000284D0941000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Loader\Release\net8.0\System.Runtime.Loader.pdb source: Editing.exe, 00000000.00000002.3214912074.00000284CFF61000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215091691.00000284D0130000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Private.Uri\Release\net8.0\System.Private.Uri.pdb source: Editing.exe, 00000000.00000002.3214257265.00000284CFC20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214057906.00000284CFB01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Primitives\Release\net8.0-windows\System.Net.Primitives.pdb source: Editing.exe, 00000000.00000002.3213703627.00000284CF931000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213728975.00000284CF950000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Security.Cryptography.ni.pdb source: Editing.exe, 00000000.00000002.3214347772.00000284CFC80000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214432901.00000284CFD41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Private.Xml.ni.pdb source: Editing.exe, 00000000.00000002.3215619881.00000284D0541000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215366959.00000284D0240000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Collections.Specialized.ni.pdb source: Editing.exe, 00000000.00000002.3216124709.00000284D09C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216165832.00000284D09E0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Xml.ReaderWriter\Release\net8.0\System.Xml.ReaderWriter.pdb source: Editing.exe, 00000000.00000002.3213973895.00000284CFAF1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214871433.00000284CFF50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Emit.ILGeneration\Release\net8.0\System.Reflection.Emit.ILGeneration.pdb source: Editing.exe, 00000000.00000002.3215193208.00000284D0161000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215214561.00000284D0170000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Runtime.Serialization.Primitives.ni.pdb source: Editing.exe, 00000000.00000002.3215131916.00000284D0141000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215153387.00000284D0150000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Runtime.InteropServices.ni.pdb source: Editing.exe, 00000000.00000002.3212402002.00000284CCAA1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212420646.00000284CCAB0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Linq\Release\net8.0\System.Linq.pdbSHA256R source: Editing.exe, 00000000.00000002.3215281217.00000284D01B1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215234136.00000284D0180000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading\Release\net8.0\System.Threading.pdb source: Editing.exe, 00000000.00000002.3212506695.00000284CCAE1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212526014.00000284CCAF0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Private.DataContractSerialization/Release/net8.0/System.Private.DataContractSerialization.pdb source: Editing.exe, 00000000.00000002.3215019846.00000284D0051000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214933418.00000284CFF70000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdbSHA256 source: Editing.exe, 00000000.00000002.3216088459.00000284D09B0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216068311.00000284D09A1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Text.RegularExpressions.ni.pdb source: Editing.exe, 00000000.00000002.3215328342.00000284D01E1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215842835.00000284D0840000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Security.Claims.ni.pdb source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\Corehost.Static\singlefilehost.pdb source: Editing.exe |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Http\Release\net8.0-windows\System.Net.Http.pdb source: Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213789653.00000284CF980000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\System.Private.CoreLib\x64\Release\System.Private.CoreLib.pdb source: Editing.exe, 00000000.00000002.3213036029.00000284CD121000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212619407.00000284CCB30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Serialization.Primitives\Release\net8.0\System.Runtime.Serialization.Primitives.pdbSHA256 source: Editing.exe, 00000000.00000002.3215131916.00000284D0141000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215153387.00000284D0150000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Memory\Release\net8.0\System.Memory.pdb source: Editing.exe, 00000000.00000002.3216145339.00000284D09D0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212913296.00000284CCFC8000.00000004.00000020.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216549510.00000284D0E41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Emit.ILGeneration\Release\net8.0\System.Reflection.Emit.ILGeneration.pdbSHA256 source: Editing.exe, 00000000.00000002.3215193208.00000284D0161000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215214561.00000284D0170000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.ComponentModel.Primitives\Release\net8.0\System.ComponentModel.Primitives.pdb source: Editing.exe, 00000000.00000002.3212165209.00000284CC9C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212254148.00000284CCA30000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.ServicePoint\Release\net8.0\System.Net.ServicePoint.pdbSHA256 source: Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Net.NameResolution.ni.pdb source: Editing.exe, 00000000.00000002.3214735866.00000284CFED0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214672966.00000284CFEB1000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Console.ni.pdb source: Editing.exe, 00000000.00000002.3212975104.00000284CD0C0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212597286.00000284CCB11000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Sockets\Release\net8.0-windows\System.Net.Sockets.pdb source: Editing.exe, 00000000.00000002.3214572685.00000284CFE30000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214620254.00000284CFE71000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Security.Claims\Release\net8.0\System.Security.Claims.pdb source: Editing.exe, 00000000.00000002.3212365601.00000284CCA90000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3212288969.00000284CCA41000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Diagnostics.DiagnosticSource.ni.pdb source: Editing.exe, 00000000.00000002.3214089010.00000284CFB20000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3214140885.00000284CFB51000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: System.Net.Http.ni.pdb source: Editing.exe, 00000000.00000002.3213884907.00000284CFA31000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213789653.00000284CF980000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Threading.ni.pdb source: Editing.exe, 00000000.00000002.3212506695.00000284CCAE1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212526014.00000284CCAF0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdb source: Editing.exe, 00000000.00000002.3211317727.0000024437D40000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3211294592.0000024437D31000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: :C:\Users\user\AppData\Local\Temp\fri53hgi\fri53hgi.pdb source: powershell.exe, 00000004.00000002.2191077266.0000020A63B94000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.InteropServices\Release\net8.0\System.Runtime.InteropServices.pdb source: Editing.exe, 00000000.00000002.3212402002.00000284CCAA1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212420646.00000284CCAB0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.ServicePoint.ni.pdb source: Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections.Specialized\Release\net8.0\System.Collections.Specialized.pdb source: Editing.exe, 00000000.00000002.3216124709.00000284D09C1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3216165832.00000284D09E0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.ServicePoint\Release\net8.0\System.Net.ServicePoint.pdb source: Editing.exe, 00000000.00000002.3216224267.00000284D0A10000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216204347.00000284D0A01000.00000020.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.RegularExpressions\Release\net8.0\System.Text.RegularExpressions.pdb source: Editing.exe, 00000000.00000002.3215328342.00000284D01E1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3215842835.00000284D0840000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Security.Principal.Windows\Release\net8.0-windows\System.Security.Principal.Windows.pdb source: Editing.exe, 00000000.00000002.3212344387.00000284CCA71000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3212307083.00000284CCA50000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdbSHA2560 source: Editing.exe, 00000000.00000002.3214715169.00000284CFEC1000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3214755813.00000284CFEE0000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: System.Net.Primitives.ni.pdb source: Editing.exe, 00000000.00000002.3213703627.00000284CF931000.00000020.00001000.00020000.00000000.sdmp, Editing.exe, 00000000.00000002.3213728975.00000284CF950000.00000004.10000000.00040000.00000000.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Management/Release/net8.0-windows/System.Management.pdb source: Editing.exe, 00000000.00000002.3215961512.00000284D08F0000.00000004.10000000.00040000.00000000.sdmp, Editing.exe, 00000000.00000002.3216014096.00000284D0941000.00000020.00001000.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\ Editing.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | |