Source: msiexec.exe, 0000000A.00000002.2138821728.0000000023111000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://aborters.duckdns.org:8081 |
Source: msiexec.exe, 0000000A.00000002.2138821728.0000000023111000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://anotherarmy.dns.army:8081 |
Source: msiexec.exe, 0000000A.00000002.2138821728.0000000023111000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: msiexec.exe, 0000000A.00000002.2138821728.0000000023111000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: svchost.exe, 00000004.00000002.2124336146.0000017916E00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: svchost.exe, 00000004.00000003.1205875695.0000017916C50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: DayVXJx1km.exe, DayVXJx1km.exe, 00000000.00000002.917608954.0000000000409000.00000004.00000001.01000000.00000003.sdmp, DayVXJx1km.exe, 00000000.00000000.852916444.0000000000409000.00000008.00000001.01000000.00000003.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: DayVXJx1km.exe, 00000000.00000002.917608954.0000000000409000.00000004.00000001.01000000.00000003.sdmp, DayVXJx1km.exe, 00000000.00000000.852916444.0000000000409000.00000008.00000001.01000000.00000003.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: powershell.exe, 00000002.00000002.1285606591.0000000006168000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005256000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1281137606.0000000003276000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005256000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005101000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.0000000023111000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005256000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: msiexec.exe, 0000000A.00000002.2138821728.0000000023111000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://varders.kozow.com:8081 |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005256000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1281137606.0000000003276000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000002.00000002.1304839622.00000000087DE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft. |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org?q= |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005101000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore6lBDr |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005256000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/winsvr-2022-pshelp |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000231F4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000231F4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000231F4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text= |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000231F4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:585948%0D%0ADate%20a |
Source: msiexec.exe, 0000000A.00000003.1381247966.00000000076BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381302582.00000000076F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://apis.google.com |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000232A0000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.00000000232D1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.0000000023291000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000232A0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=en4 |
Source: msiexec.exe, 0000000A.00000002.2138821728.000000002329B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://chrome.google.com/webstore?hl=enlBDr |
Source: powershell.exe, 00000002.00000002.1285606591.0000000006168000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000002.00000002.1285606591.0000000006168000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000002.00000002.1285606591.0000000006168000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: msiexec.exe, 0000000A.00000002.2126450600.000000000764A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/ |
Source: msiexec.exe, 0000000A.00000002.2126450600.000000000764A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/RTM |
Source: msiexec.exe, 0000000A.00000002.2137797018.0000000022790000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/uc?export=download&id=1QurKUc0ghYjIDgsS84_iF-tHS7pzgER9 |
Source: msiexec.exe, 0000000A.00000002.2126450600.000000000764A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/uc?export=download&id=1QurKUc0ghYjIDgsS84_iF-tHS7pzgER9.Lc |
Source: msiexec.exe, 0000000A.00000002.2126450600.000000000764A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/uc?export=download&id=1QurKUc0ghYjIDgsS84_iF-tHS7pzgER9JN |
Source: msiexec.exe, 0000000A.00000002.2126450600.00000000076A7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1451468651.00000000076BC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1451268816.00000000076B3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/ |
Source: msiexec.exe, 0000000A.00000002.2126450600.00000000076A7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381247966.00000000076BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381302582.00000000076F5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1451468651.00000000076BC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1451268816.00000000076B3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1QurKUc0ghYjIDgsS84_iF-tHS7pzgER9&export=download |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtabv20 |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: svchost.exe, 00000004.00000003.1205875695.0000017916CC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/Prod/C: |
Source: svchost.exe, 00000004.00000003.1205875695.0000017916C50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C: |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gemini.google.com/app?q= |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005256000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1281137606.0000000003276000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000002.00000002.1285606591.0000000006168000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000231CC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.000000002315C000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.00000000231F4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: msiexec.exe, 0000000A.00000002.2138821728.000000002315C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000231F4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189 |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000231CC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.0000000023187000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.00000000231F4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$ |
Source: msiexec.exe, 0000000A.00000003.1381247966.00000000076BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381302582.00000000076F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ssl.gstatic.com |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/v20w |
Source: msiexec.exe, 0000000A.00000003.1381247966.00000000076BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381302582.00000000076F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google-analytics.com;report-uri |
Source: msiexec.exe, 0000000A.00000003.1381247966.00000000076BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381302582.00000000076F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: msiexec.exe, 0000000A.00000002.2141555586.00000000243EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2141555586.0000000024426000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico |
Source: msiexec.exe, 0000000A.00000003.1381247966.00000000076BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381302582.00000000076F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.googletagmanager.com |
Source: msiexec.exe, 0000000A.00000003.1381247966.00000000076BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.1381302582.00000000076F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000232D1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2138821728.00000000232C2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/ |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000232D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/4 |
Source: msiexec.exe, 0000000A.00000002.2138821728.00000000232CC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/lBDr |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kdscli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DayVXJx1km.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599657 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599532 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599407 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599266 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599157 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599032 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598907 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598794 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598672 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598409 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598278 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598157 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598032 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597907 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597782 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597657 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597532 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597407 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597297 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597188 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597063 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596938 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596813 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596688 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596578 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596469 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596344 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596234 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596125 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595969 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595814 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595700 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595579 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595449 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595341 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595219 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595110 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594985 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594860 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594735 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594610 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594485 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594360 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594235 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594110 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 593985 | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5852 | Thread sleep time: -5534023222112862s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 2028 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep count: 33 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -30437127721620741s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599875s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5504 | Thread sleep count: 1996 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5504 | Thread sleep count: 7839 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599766s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599657s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599532s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599407s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599266s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599157s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -599032s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598907s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598794s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598672s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598562s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598409s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598278s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598157s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -598032s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597907s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597782s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597657s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597532s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597407s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597297s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597188s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -597063s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596938s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596813s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596688s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596578s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596469s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596344s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596234s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -596125s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595969s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595814s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595700s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595579s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595449s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595341s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595219s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -595110s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594985s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594860s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594735s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594610s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594485s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594360s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594235s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -594110s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 5516 | Thread sleep time: -593985s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599875 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599766 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599657 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599532 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599407 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599266 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599157 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 599032 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598907 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598794 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598672 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598562 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598409 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598278 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598157 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 598032 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597907 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597782 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597657 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597532 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597407 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597297 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597188 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 597063 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596938 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596813 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596688 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596578 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596469 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596344 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596234 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 596125 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595969 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595814 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595700 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595579 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595449 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595341 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595219 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 595110 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594985 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594860 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594735 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594610 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594485 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594360 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594235 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 594110 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Thread delayed: delay time: 593985 | Jump to behavior |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696494690 |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005A6D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Remove-NetEventVmNetworkAdapter@\Dr |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005A6D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Remove-NetEventVmNetworkAdapter |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696494690f |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696494690s |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696494690n |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696494690d |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005A6D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Add-NetEventVmNetworkAdapter@\Dr |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696494690u |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696494690t |
Source: svchost.exe, 00000004.00000002.2124452140.0000017916E58000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2126450600.00000000076A7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2126450600.000000000764A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696494690} |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696494690x |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005A6D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Get-NetEventVmNetworkAdapter |
Source: svchost.exe, 00000004.00000002.2122752654.000001791182B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW` |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690^ |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696494690h |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696494690o |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696494690~ |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696494690 |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005A6D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Add-NetEventVmNetworkAdapter |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696494690j |
Source: powershell.exe, 00000002.00000002.1282096196.0000000005A6D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Get-NetEventVmNetworkAdapter@\Dr |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696494690t |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696494690x |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690} |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696494690] |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690x |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690 |
Source: msiexec.exe, 0000000A.00000002.2141555586.000000002438B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696494690|UE |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Queries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |