Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 10_2_00419070 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov word ptr [eax], cx | 10_2_0042977A |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then lea eax, dword ptr [esp+000002D4h] | 10_2_004197EB |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx-000000EBh] | 10_2_00443790 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp word ptr [edi+eax], 0000h | 10_2_00425BA0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [ebx+eax-5BFBFFF6h] | 10_2_00412C13 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edi, byte ptr [esp+edx-000000AAh] | 10_2_0040FFF0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], cl | 10_2_00433FF6 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 10_2_0043D0C0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ecx, eax | 10_2_0042B120 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov word ptr [edi], cx | 10_2_00427130 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ebp, eax | 10_2_004471E0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 10_2_004301F0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h | 10_2_0041B26C |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 10_2_0040A2D0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 10_2_0040A2D0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov edi, dword ptr [esp+20h] | 10_2_00410280 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then push eax | 10_2_0044529F |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], cl | 10_2_0043430A |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], al | 10_2_0043430A |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [edi], bl | 10_2_0040C310 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], cl | 10_2_004343C2 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], al | 10_2_004343C2 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+50h] | 10_2_0042C388 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], cl | 10_2_004343B2 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], al | 10_2_004343B2 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ecx, eax | 10_2_00432479 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+04h] | 10_2_0041E4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h | 10_2_0041E4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+5Ch] | 10_2_0041E4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ecx+04h] | 10_2_0041E4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+04h] | 10_2_0041E4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h | 10_2_0041E4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ecx, eax | 10_2_0042F6A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp byte ptr [esi+ebx], 00000000h | 10_2_00431720 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [ecx+esi] | 10_2_004027C0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx esi, word ptr [ecx] | 10_2_0041D7BF |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, word ptr [ecx] | 10_2_0041D7BF |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+14h] | 10_2_0042C870 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+47h] | 10_2_0042C870 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov dword ptr [esi+eax], 00000000h | 10_2_0042C870 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 6E74889Ah | 10_2_004128D3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 6E74889Ah | 10_2_004128D3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 10_2_0040A8F0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+021D28A5h] | 10_2_0042C890 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then lea eax, dword ptr [esp+000002D4h] | 10_2_0041989B |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov esi, edx | 10_2_0041A94D |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ebx, byte ptr [eax+edx] | 10_2_00423960 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ecx, eax | 10_2_0043297D |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], cl | 10_2_00432917 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [esi], al | 10_2_00432917 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+00000174h] | 10_2_004349C6 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov edx, ecx | 10_2_004439E0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ecx, eax | 10_2_004323F9 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then lea ecx, dword ptr [eax+eax] | 10_2_0040CA50 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov edx, ecx | 10_2_0040CA50 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [ebp+eax-000000C0h] | 10_2_0042EA60 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then push eax | 10_2_00410A76 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [eax], bl | 10_2_00410A76 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, word ptr [esi] | 10_2_00446AE0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [ebp+eax-000000C0h] | 10_2_0042EA60 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+200415BEh] | 10_2_0041FC5E |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov esi, eax | 10_2_00445515 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ecx, eax | 10_2_0042ACF4 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx+02h] | 10_2_00426CA0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ecx-035FA4E5h] | 10_2_00426CA0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ecx, eax | 10_2_0042ACAC |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+3949D1B0h] | 10_2_0040DD03 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov edx, esi | 10_2_00434DE3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov edx, esi | 10_2_00434DE3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax] | 10_2_00443DB0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ebp, eax | 10_2_00446DB9 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx eax, byte ptr [esp+edx+04h] | 10_2_00443E50 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov ebp, eax | 10_2_00446E30 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov word ptr [eax], cx | 10_2_0041AECF |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+54h] | 10_2_00432ECD |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+40C27F55h] | 10_2_00419ED9 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov dword ptr [esp+0000009Ch], 00000000h | 10_2_0041CE95 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then mov byte ptr [eax], cl | 10_2_0041BF01 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 61A44046h | 10_2_0041BF17 |
Source: C:\Windows\Temp\cmd.exe | Code function: 4x nop then movsx eax, byte ptr [esi+ecx] | 10_2_00418FB0 |
Source: powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://91.206.178.120:5001 |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://91.206.178.120:5001/script_end?random_number= |
Source: notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, get_txt.ps1 | String found in binary or memory: http://91.206.178.120:5001/script_end?random_number=$randomNumber |
Source: powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://91.206.178.120:5001/script_end?random_number=29634 |
Source: powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://91.206.178.120:5001/script_end?random_number=29634$M |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://91.206.178.120:5001/script_start?ip= |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497081959.000000FDFB8A9000.00000004.00000010.00020000.00000000.sdmp, get_txt.ps1 | String found in binary or memory: http://91.206.178.120:5001/script_start?ip=$ipAddress&os=$osVersion&memory=$memory&random_number=$ra |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&m |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497081959.000000FDFB8A9000.00000004.00000010.00020000.00000000.sdmp, get_txt.ps1 | String found in binary or memory: http://api.ipify.org |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.ipify.org/ |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: powershell.exe, 00000000.00000002.1425682486.0000000007BDA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.1405953720.0000000004681000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.dr | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: powershell.exe, 00000000.00000002.1405953720.0000000004681000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore6lB |
Source: cmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252. |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: cmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg |
Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2025610040.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043885038.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2041606518.0000000000C47000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/ |
Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/A |
Source: cmd.exe, 0000000A.00000002.2102253733.0000000000BDE000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C23000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2066952978.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2089874877.0000000000BDE000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074794526.0000000000BDE000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043952153.0000000000C33000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/api |
Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C23000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/api0 |
Source: cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/apiF |
Source: cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/apig |
Source: cmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043952153.0000000000C33000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/apiied |
Source: cmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2066952978.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/apimeP |
Source: cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech/apior |
Source: cmd.exe, 0000000A.00000003.2074794526.0000000000BCF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://healthyjouprney.tech:443/api |
Source: cmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e |
Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000000.00000002.1405953720.0000000004918000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://sandramosquedamx.com |
Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, get_txt.ps1 | String found in binary or memory: https://sandramosquedamx.com/wp-content/plugins/newsletter/images/gtyh.exe |
Source: B36A69092427CC90.dat.10.dr | String found in binary or memory: https://support.mozilla.org |
Source: B36A69092427CC90.dat.10.dr | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: cmd.exe, 0000000A.00000003.2030074239.0000000003883000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: B36A69092427CC90.dat.10.dr | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: B36A69092427CC90.dat.10.dr | String found in binary or memory: https://www.mozilla.org |
Source: B36A69092427CC90.dat.10.dr | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP |
Source: B36A69092427CC90.dat.10.dr | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW |
Source: cmd.exe, 0000000A.00000003.2030074239.0000000003883000.00000004.00000800.00020000.00000000.sdmp, B36A69092427CC90.dat.10.dr | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d |
Source: B36A69092427CC90.dat.10.dr | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: cmd.exe, 0000000A.00000003.2030074239.0000000003883000.00000004.00000800.00020000.00000000.sdmp, B36A69092427CC90.dat.10.dr | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_045CE462 | 0_2_045CE462 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00419070 | 10_2_00419070 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00448360 | 10_2_00448360 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042C4A0 | 10_2_0042C4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00433745 | 10_2_00433745 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042977A | 10_2_0042977A |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00447730 | 10_2_00447730 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004407C0 | 10_2_004407C0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004197EB | 10_2_004197EB |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040BBA0 | 10_2_0040BBA0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00412C13 | 10_2_00412C13 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00414D2B | 10_2_00414D2B |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00425EB0 | 10_2_00425EB0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00419FF3 | 10_2_00419FF3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00401040 | 10_2_00401040 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043B040 | 10_2_0043B040 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004280F4 | 10_2_004280F4 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00441080 | 10_2_00441080 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041209E | 10_2_0041209E |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043F0A5 | 10_2_0043F0A5 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00435130 | 10_2_00435130 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040D1BE | 10_2_0040D1BE |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00413250 | 10_2_00413250 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00416250 | 10_2_00416250 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041B26C | 10_2_0041B26C |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040A2D0 | 10_2_0040A2D0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00410280 | 10_2_00410280 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043831C | 10_2_0043831C |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004343C2 | 10_2_004343C2 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042E3D0 | 10_2_0042E3D0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00413462 | 10_2_00413462 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00425470 | 10_2_00425470 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00422400 | 10_2_00422400 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040E4F0 | 10_2_0040E4F0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004094F0 | 10_2_004094F0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041E4A0 | 10_2_0041E4A0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00403550 | 10_2_00403550 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00441550 | 10_2_00441550 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00446526 | 10_2_00446526 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040C5E0 | 10_2_0040C5E0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00412637 | 10_2_00412637 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041C742 | 10_2_0041C742 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00422770 | 10_2_00422770 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00426770 | 10_2_00426770 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004047D2 | 10_2_004047D2 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043F7F7 | 10_2_0043F7F7 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041579F | 10_2_0041579F |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041D7BF | 10_2_0041D7BF |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00438850 | 10_2_00438850 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042C870 | 10_2_0042C870 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00421800 | 10_2_00421800 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004198CE | 10_2_004198CE |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_004128D3 | 10_2_004128D3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041989B | 10_2_0041989B |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042D940 | 10_2_0042D940 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041A94D | 10_2_0041A94D |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00441958 | 10_2_00441958 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041C96E | 10_2_0041C96E |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00436971 | 10_2_00436971 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00432917 | 10_2_00432917 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042092F | 10_2_0042092F |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040CA50 | 10_2_0040CA50 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00410A76 | 10_2_00410A76 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00427A14 | 10_2_00427A14 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042CAD0 | 10_2_0042CAD0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00421AE0 | 10_2_00421AE0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00447B70 | 10_2_00447B70 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00408B00 | 10_2_00408B00 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00402B30 | 10_2_00402B30 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042EBC0 | 10_2_0042EBC0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042EBA6 | 10_2_0042EBA6 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00438C10 | 10_2_00438C10 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040ECC0 | 10_2_0040ECC0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042ACF4 | 10_2_0042ACF4 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00426CA0 | 10_2_00426CA0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043AD10 | 10_2_0043AD10 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00437D35 | 10_2_00437D35 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0040ADC0 | 10_2_0040ADC0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00420DC0 | 10_2_00420DC0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00407DE0 | 10_2_00407DE0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00434DE3 | 10_2_00434DE3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00446DB9 | 10_2_00446DB9 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043FE50 | 10_2_0043FE50 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00443E50 | 10_2_00443E50 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041DE0E | 10_2_0041DE0E |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00421E10 | 10_2_00421E10 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043DE1D | 10_2_0043DE1D |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00446E30 | 10_2_00446E30 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041AEC5 | 10_2_0041AEC5 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00403EF0 | 10_2_00403EF0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042BEF3 | 10_2_0042BEF3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00415EB1 | 10_2_00415EB1 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00447F60 | 10_2_00447F60 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00408F70 | 10_2_00408F70 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042DF73 | 10_2_0042DF73 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0041BF01 | 10_2_0041BF01 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00423F30 | 10_2_00423F30 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00413FCE | 10_2_00413FCE |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0042EFDA | 10_2_0042EFDA |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02661AD0 | 10_2_02661AD0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02661160 | 10_2_02661160 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02657E10 | 10_2_02657E10 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0265F680 | 10_2_0265F680 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0266D739 | 10_2_0266D739 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mshtml.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msiso.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: mrmcorer.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: efswrt.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: msimg32.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: avifil32.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: olepro32.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_045CD308 push eax; mov dword ptr [esp], edx | 0_2_045CD31C |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0044B599 pushfd ; ret | 10_2_0044B5B0 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0044DA13 push esp; retf | 10_2_0044DA1B |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_00446A80 push eax; mov dword ptr [esp], F6F1F0C3h | 10_2_00446A83 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0043CF21 push ss; retf | 10_2_0043CF27 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268135A push ebx; ret | 10_2_0268135B |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02680316 push dword ptr [esp+20h]; retn 0024h | 10_2_02680342 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026823ED push dword ptr [esp+50h]; retn 0054h | 10_2_026823F1 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026803CA push dword ptr [esp+1Ch]; retn 0020h | 10_2_02680394 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268338B push bx; mov dword ptr [esp], eax | 10_2_0268338D |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02683380 push ebx; mov dword ptr [esp], eax | 10_2_0268338D |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02680068 push ecx; ret | 10_2_026801DD |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268002F push dword ptr [esp+34h]; retn 0038h | 10_2_02680033 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026828D2 push eax; ret | 10_2_02682937 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02682962 push eax; ret | 10_2_02682937 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02682971 push dword ptr [esp+2Ch]; retn 0030h | 10_2_0268296E |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02682949 push dword ptr [esp+2Ch]; retn 0030h | 10_2_0268296E |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02680129 push ecx; ret | 10_2_02680296 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268292A push eax; ret | 10_2_02682937 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268291F push dword ptr [esp+2Ch]; retn 0030h | 10_2_0268296E |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026801E3 push ecx; ret | 10_2_026801DD |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026829B6 push dword ptr [esp+2Ch]; retn 0030h | 10_2_0268296E |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268019E push ebx; ret | 10_2_026801A1 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02681E49 push dword ptr [esp+03h]; mov dword ptr [esp], ebp | 10_2_02681E4D |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268360A push dword ptr [esp+24h]; retn 0028h | 10_2_026835AE |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026826D2 push eax; ret | 10_2_02682937 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_0268076A push ebx; ret | 10_2_0268076D |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026807F2 push edx; retf | 10_2_026807F3 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_026837C8 push dword ptr [esp+10h]; retn 0014h | 10_2_026837C4 |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02684FCA push es; ret | 10_2_02684FCD |
Source: C:\Windows\Temp\cmd.exe | Code function: 10_2_02682789 push dword ptr [esp+04h]; retn 0008h | 10_2_026827AD |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC\Microsoft.mshtml\7.0.3300.0__b03f5f7f11d50a3a\Microsoft.mshtml.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Queries volume information: C:\Users\user\Desktop\get_txt.ps1 VolumeInformation | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.db | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\logins.json | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.db | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Windows\Temp\cmd.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |