Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_000001A7A51615C0 NtAcceptConnectPort, | 19_2_000001A7A51615C0 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_000001A7A5161CF4 NtAcceptConnectPort,CloseHandle, | 19_2_000001A7A5161CF4 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BF0B8 NtAcceptConnectPort, | 19_2_00007DF4111BF0B8 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BEFAC NtAcceptConnectPort, | 19_2_00007DF4111BEFAC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BFFDC RtlDosPathNameToNtPathName_U,NtAcceptConnectPort,NtAcceptConnectPort,free, | 19_2_00007DF4111BFFDC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BEFCC NtAcceptConnectPort, | 19_2_00007DF4111BEFCC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BF050 NtAcceptConnectPort, | 19_2_00007DF4111BF050 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111C0188 NtAcceptConnectPort,free, | 19_2_00007DF4111C0188 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BF224 NtAcceptConnectPort, | 19_2_00007DF4111BF224 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BF244 NtAcceptConnectPort, | 19_2_00007DF4111BF244 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BF3FC CreateFileMappingW,MapViewOfFile,DuplicateHandle,NtAcceptConnectPort, | 19_2_00007DF4111BF3FC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BF76C calloc,DuplicateHandle,NtAcceptConnectPort,free,NtAcceptConnectPort,NtAcceptConnectPort, | 19_2_00007DF4111BF76C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BEEF0 NtAcceptConnectPort, | 19_2_00007DF4111BEEF0 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964FF19C NtAcceptConnectPort, | 20_2_0000026D964FF19C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964FEF64 NtAcceptConnectPort, | 20_2_0000026D964FEF64 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free, | 31_3_00007DF4EDC91CE8 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free, | 31_3_00007DF4EDC91CE8 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory, | 31_3_00007DF4EDC91958 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory, | 31_3_00007DF4EDC91958 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory, | 31_3_00007DF4EDC91958 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory, | 31_3_00007DF4EDC91958 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC81AD0 NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,CreateProcessW,free,CreateFileW,WriteFile,CloseHandle,RegCreateKeyExW,RegSetValueExW,RegCloseKey,free, | 31_3_00007DF4EDC81AD0 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free, | 31_3_00007DF4EDC91CE8 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free, | 31_3_00007DF4EDC91CE8 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8147C CoInitializeEx,RegQueryValueExW,CoInitializeSecurity,CoCreateInstance,GetVolumeInformationW,CoUninitialize,NtQueryInformationProcess, | 31_3_00007DF4EDC8147C |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_03007039 | 0_2_03007039 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_03007048 | 0_2_03007048 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_03006AA8 | 0_2_03006AA8 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_03006AB8 | 0_2_03006AB8 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_0300AC88 | 0_2_0300AC88 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_0738E810 | 0_2_0738E810 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_07388E50 | 0_2_07388E50 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_07839808 | 0_2_07839808 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A1BDD | 19_3_000001A7A51A1BDD |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A27D3 | 19_3_000001A7A51A27D3 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A5EC8 | 19_3_000001A7A51A5EC8 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A55C8 | 19_3_000001A7A51A55C8 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A5948 | 19_3_000001A7A51A5948 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A4A84 | 19_3_000001A7A51A4A84 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A2C73 | 19_3_000001A7A51A2C73 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_3_000001A7A51A252E | 19_3_000001A7A51A252E |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_000001A7A5160C70 | 19_2_000001A7A5160C70 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111A4040 | 19_2_00007DF4111A4040 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111B1364 | 19_2_00007DF4111B1364 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41119286C | 19_2_00007DF41119286C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111A7E74 | 19_2_00007DF4111A7E74 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111E40B4 | 19_2_00007DF4111E40B4 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111EF0C4 | 19_2_00007DF4111EF0C4 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111FD100 | 19_2_00007DF4111FD100 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411195FA0 | 19_2_00007DF411195FA0 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111E6FB0 | 19_2_00007DF4111E6FB0 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127DFB4 | 19_2_00007DF41127DFB4 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127EFBC | 19_2_00007DF41127EFBC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41128C010 | 19_2_00007DF41128C010 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411191058 | 19_2_00007DF411191058 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111ED050 | 19_2_00007DF4111ED050 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127F354 | 19_2_00007DF41127F354 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111F0344 | 19_2_00007DF4111F0344 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41126E1EC | 19_2_00007DF41126E1EC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111FD210 | 19_2_00007DF4111FD210 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111C5254 | 19_2_00007DF4111C5254 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127C4B0 | 19_2_00007DF41127C4B0 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127E4EC | 19_2_00007DF41127E4EC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41128C52C | 19_2_00007DF41128C52C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111A2500 | 19_2_00007DF4111A2500 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111AF408 | 19_2_00007DF4111AF408 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111E56C0 | 19_2_00007DF4111E56C0 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41120D610 | 19_2_00007DF41120D610 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111FD668 | 19_2_00007DF4111FD668 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111BD8B8 | 19_2_00007DF4111BD8B8 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127E908 | 19_2_00007DF41127E908 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111D8910 | 19_2_00007DF4111D8910 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41123A790 | 19_2_00007DF41123A790 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411201784 | 19_2_00007DF411201784 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411272A7C | 19_2_00007DF411272A7C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411210AE4 | 19_2_00007DF411210AE4 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111B1B54 | 19_2_00007DF4111B1B54 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41119F9A0 | 19_2_00007DF41119F9A0 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111B198C | 19_2_00007DF4111B198C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127A9E4 | 19_2_00007DF41127A9E4 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111E5A0C | 19_2_00007DF4111E5A0C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41125DC78 | 19_2_00007DF41125DC78 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41129BD30 | 19_2_00007DF41129BD30 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111E3D28 | 19_2_00007DF4111E3D28 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411298D64 | 19_2_00007DF411298D64 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411205BEC | 19_2_00007DF411205BEC |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411284C70 | 19_2_00007DF411284C70 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111F0EA0 | 19_2_00007DF4111F0EA0 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111FCF24 | 19_2_00007DF4111FCF24 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411277D94 | 19_2_00007DF411277D94 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4111CCD74 | 19_2_00007DF4111CCD74 |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF411231D7C | 19_2_00007DF411231D7C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF4112B7E4C | 19_2_00007DF4112B7E4C |
Source: C:\Windows\System32\svchost.exe | Code function: 19_2_00007DF41127EE3C | 19_2_00007DF41127EE3C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964F1B54 | 20_2_0000026D964F1B54 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96545BEC | 20_2_0000026D96545BEC |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9659DC78 | 20_2_0000026D9659DC78 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96518910 | 20_2_0000026D96518910 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965BE908 | 20_2_0000026D965BE908 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964DF9A0 | 20_2_0000026D964DF9A0 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964F198C | 20_2_0000026D964F198C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965BA9E4 | 20_2_0000026D965BA9E4 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96525A0C | 20_2_0000026D96525A0C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965B2A7C | 20_2_0000026D965B2A7C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9657A790 | 20_2_0000026D9657A790 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96541784 | 20_2_0000026D96541784 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964FD8B8 | 20_2_0000026D964FD8B8 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964D286C | 20_2_0000026D964D286C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965CC52C | 20_2_0000026D965CC52C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965BE4EC | 20_2_0000026D965BE4EC |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964E2500 | 20_2_0000026D964E2500 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9654D610 | 20_2_0000026D9654D610 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965256C0 | 20_2_0000026D965256C0 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9653D668 | 20_2_0000026D9653D668 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96530344 | 20_2_0000026D96530344 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964F1364 | 20_2_0000026D964F1364 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965BF354 | 20_2_0000026D965BF354 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964EF408 | 20_2_0000026D964EF408 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9653D100 | 20_2_0000026D9653D100 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9653D210 | 20_2_0000026D9653D210 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965AE1EC | 20_2_0000026D965AE1EC |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9653CF24 | 20_2_0000026D9653CF24 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964D5FA0 | 20_2_0000026D964D5FA0 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96526FB0 | 20_2_0000026D96526FB0 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965BEFBC | 20_2_0000026D965BEFBC |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965BDFB4 | 20_2_0000026D965BDFB4 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965CC010 | 20_2_0000026D965CC010 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965FF008 | 20_2_0000026D965FF008 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9652F0C4 | 20_2_0000026D9652F0C4 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965240B4 | 20_2_0000026D965240B4 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964D1058 | 20_2_0000026D964D1058 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9652D050 | 20_2_0000026D9652D050 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96523D28 | 20_2_0000026D96523D28 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965B7D94 | 20_2_0000026D965B7D94 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965D8D64 | 20_2_0000026D965D8D64 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D9650CD74 | 20_2_0000026D9650CD74 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D965BEE3C | 20_2_0000026D965BEE3C |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D96530EA0 | 20_2_0000026D96530EA0 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Code function: 20_2_0000026D964E7E74 | 20_2_0000026D964E7E74 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC92204 | 31_3_00007DF4EDC92204 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC92204 | 31_3_00007DF4EDC92204 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC94EFC | 31_3_00007DF4EDC94EFC |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC9392C | 31_3_00007DF4EDC9392C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC92520 | 31_3_00007DF4EDC92520 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC81AD0 | 31_3_00007DF4EDC81AD0 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8147C | 31_3_00007DF4EDC8147C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC83838 | 31_3_00007DF4EDC83838 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC9392C | 31_3_00007DF4EDC9392C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC93942 | 31_3_00007DF4EDC93942 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC9392C | 31_3_00007DF4EDC9392C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC85540 | 31_3_00007DF4EDC85540 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC85F68 | 31_3_00007DF4EDC85F68 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8AD54 | 31_3_00007DF4EDC8AD54 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8BD10 | 31_3_00007DF4EDC8BD10 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC9392C | 31_3_00007DF4EDC9392C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8A328 | 31_3_00007DF4EDC8A328 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC9392C | 31_3_00007DF4EDC9392C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8A918 | 31_3_00007DF4EDC8A918 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC92520 | 31_3_00007DF4EDC92520 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8FB14 | 31_3_00007DF4EDC8FB14 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8B0B4 | 31_3_00007DF4EDC8B0B4 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC836F0 | 31_3_00007DF4EDC836F0 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8769C | 31_3_00007DF4EDC8769C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8CC44 | 31_3_00007DF4EDC8CC44 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8C640 | 31_3_00007DF4EDC8C640 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8323C | 31_3_00007DF4EDC8323C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8F254 | 31_3_00007DF4EDC8F254 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC92204 | 31_3_00007DF4EDC92204 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC92204 | 31_3_00007DF4EDC92204 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC907E8 | 31_3_00007DF4EDC907E8 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC859DC | 31_3_00007DF4EDC859DC |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC89FAC | 31_3_00007DF4EDC89FAC |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_00007DF4EDC8B5A0 | 31_3_00007DF4EDC8B5A0 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371F40 | 31_3_0000025297371F40 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297370283 | 31_3_0000025297370283 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_000002529737366C | 31_3_000002529737366C |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Code function: 31_3_0000025297371716 | 31_3_0000025297371716 |
Source: unknown | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1" | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\aXeuKjNXAK.ps1" | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8584 -s 496 | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrE13A.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c462449b" | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2384,i,821600477713917837,7370031636428871877,262144 --variations-seed-version --mojo-platform-channel-handle=2424 /prefetch:3 | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrEA73.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c7af6c55" | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2856 --field-trial-handle=2544,i,11316292491415656380,10520758499601027494,262144 /prefetch:3 | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Media Player\wmpnscfg.exe "C:\Program Files\Windows Media Player\wmpnscfg.exe" | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Process created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe" | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBBEB.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c462449b" | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2220,i,13043762925271715218,17970797598959637433,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3 | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBF76.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c7af6c55" | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2036,i,18426108416146909067,2597470961201146140,262144 /prefetch:3 | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Process created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe" | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrE13A.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c462449b" | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrEA73.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c7af6c55" | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Media Player\wmpnscfg.exe "C:\Program Files\Windows Media Player\wmpnscfg.exe" | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2384,i,821600477713917837,7370031636428871877,262144 --variations-seed-version --mojo-platform-channel-handle=2424 /prefetch:3 | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2856 --field-trial-handle=2544,i,11316292491415656380,10520758499601027494,262144 /prefetch:3 | Jump to behavior |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Process created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe" | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Process created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe" | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBBEB.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c462449b" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBF76.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c7af6c55" | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2220,i,13043762925271715218,17970797598959637433,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3 | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2036,i,18426108416146909067,2597470961201146140,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: mrmcorer.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: efswrt.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: cryptbase.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: mswsock.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: uxtheme.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: secur32.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: sspicli.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: dpapi.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: taskschd.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: xmllite.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: taskschd.dll | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Section loaded: xmllite.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: msi.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: netapi32.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: wtsapi32.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: msimg32.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: wkscli.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: cscapi.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: dbghelp.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: dbgcore.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: dbghelp.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: dbgcore.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Section loaded: windowscodecs.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: devobj.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: drprov.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winsta.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntlanman.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: davclnt.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: davhlpr.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netapi32.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cscapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: sxs.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dpapi.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: cryptbase.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: dbghelp.dll | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: rmclient.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: userdeviceregistration.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: dsreg.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: msvcp110_win.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\RuntimeBroker.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\dllhost.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Media Player\wmpnscfg.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dllhost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dllhost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\RuntimeBroker.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dllhost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dllhost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $HwezPbTrqRzEPpxUzbr = ((($FawqemuyBmsawwOHZu + -473198) - 98784) * (((((((-7341 + 14334) - $tGRbbBukDU) - ((((($WiXVRGlNgyS + 169) * 34625)) - ((((3 * -50350) - $YTANJGNkttH) * $KnBvQNIHSMXTUJskYJcnB) - $YTANJGNkttH)))) - $feiJBcWxyNQPnmQF)) - (((((25 * -348) + -330) - $QUsnODxygywaKYx)) - ((((($aAgxKPHokoeshJGNDq - $WOwGSKBvgxtdHIYcrZdL) - $BkyEihFJBoLlc) + $ukDbGXPMFWbsRJLfkfBGE) * $VnIeYxcKsDXfxF) + $lxbwosjsc))))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $BkyEihFJBoLlc = (($KnBvQNIHSMXTUJskYJcnB * (((((($feiJBcWxyNQPnmQF + $BhnfWCjCT) + -878002) * (((((-811 + $FetNiyptiqwiiSW) - (((((($FawqemuyBmsawwOHZu + $SNDYinOatvVRp) + 75) * $ukDbGXPMFWbsRJLfkfBGE) + $VkqtaafnKLPLPjl) + $VkqtaafnKLPLPjl))) - 416603) - $BDXwthxItR)))) - (((((($xJgLSmCGExgpDeuwGs + $aUvphQevd) - -9438) - (((((7648 * 57) - $FetNiyptiqwiiSW) + -759711) * $DDnVDvxasyZGaH))) * $isXPtwPNlizAuJTRNJSR)) * ((((($tGRbbBukDU * $uZjFCHCuwgMRmVuD) + $feiJBcWxyNQPnmQF) - $uZjFCHCuwgMRmVuD) * $uZjFCHCuwgMRmVuD) + 544))))) * -22) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $ejrThZkPCAQIEm = ((((($tGRbbBukDU * -464109) * ((((4 + $QLizooERIru) * $FawqemuyBmsawwOHZu) - $VkqtaafnKLPLPjl))) + $KTYbPJqBBiAcptx) + $SNDYinOatvVRp) - $KTYbPJqBBiAcptx) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((4563 -ge $FawqemuyBmsawwOHZu) -or ($LEmnzzpePRBsXpSczHuel -le $coHFkxmaSTBQmOca) -or (997 -eq -39824)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = ((($keEoMANEKklErqkS * -7998) + $bvNcHjfwFu) + $QLizooERIru) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $jRiEEMSDahtDXRX = ((((($wdiOzNWDJbtitMpyhtP + $KTYbPJqBBiAcptx) + $ljKWwLiwvNQFdMQABBdY) * $BpmVieflXB)) + (((((($eSGXcVDTWCrHpHdd - -17683) - ((((((149040 * 954) + 97) * (((((-7 * 74461) * $nThZRFHczodCQIjn) * 991800) + $xVAhdipiHTyyKaaPS))) - (((((($DwXHSGGMiILc + -760) * 908) + $pZTjfifajVwieNsXpLR) * -511) + -552605))) - ((($WOwGSKBvgxtdHIYcrZdL - -7) * $bABhRHoDjnMXwTzxW))))) * ((((1 * $KnBvQNIHSMXTUJskYJcnB) * -89) + (((((($FawqemuyBmsawwOHZu + 83) - 32639) - $ukDbGXPMFWbsRJLfkfBGE) - 3918) + -62436))))) - $feiJBcWxyNQPnmQF)) * ((-9 * 79) + -55517))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $MuNChZebK = ((((((8960 + $FawqemuyBmsawwOHZu) + ((((($SDnIVLdAPekHPz * $zYPpmoxLomkKZJtCicT) + ((((-205 + 4) - -152) + 4224)))) * ((($jRiEEMSDahtDXRX * -123) + $yycCLpGMIMmv) * -899149)))) - (((($gsRwOcOmjjUpCXTcsHn * ((((((-652 + -5405) + -7) - $aAgxKPHokoeshJGNDq) * $FawqemuyBmsawwOHZu) + $ejrThZkPCAQIEm))) - $eaEMrGlxnEWQmjDHR) * ((($YjwYiuvYpNuZt - $aUvphQevd) - 6031))))) + (((-59716 * ((((-516 * -5) * -892384) - 5))) * $aUvphQevd)))) * ((((((($QLizooERIru - 746) + 807744) - 48626) - $VkqtaafnKLPLPjl) - 37443)) * ((((($gsRwOcOmjjUpCXTcsHn + 700) + 65) + 39878) * $cvZBawIacuX) + $AAhEbgCCcmlT))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $OSmhCCiVVcvaoDlx = ((((($YTANJGNkttH + ((((($AAhEbgCCcmlT + $FawqemuyBmsawwOHZu) + $ukDbGXPMFWbsRJLfkfBGE) + $AAhEbgCCcmlT) * -84239))) + $FawqemuyBmsawwOHZu) - (((((($BkyEihFJBoLlc + 353370) - 49) * -6) - -6295) * $xJgLSmCGExgpDeuwGs))) + $DDnVDvxasyZGaH) + ((((((24 - $feiJBcWxyNQPnmQF) - $ccHRSZAjBHKVLIoy) + $eaEMrGlxnEWQmjDHR) * 287115) + -15))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($FawqemuyBmsawwOHZu -gt $vqIPLFNhrODYOdbmYl) -or ($LEcjISrNC -ne $ukDbGXPMFWbsRJLfkfBGE) -or ($aAgxKPHokoeshJGNDq -le $OSmhCCiVVcvaoDlx)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $DDnVDvxasyZGaH = (($DDnVDvxasyZGaH - (((((((6 + $WjSVLmvOVInmUrVgua) - $eaEMrGlxnEWQmjDHR) * -467) * ((((((-10731 * $SNDYinOatvVRp) * ((($LEmnzzpePRBsXpSczHuel - 2) * $oeDgCMrdUrTnYrZ))) * $KnBvQNIHSMXTUJskYJcnB) - $feiJBcWxyNQPnmQF) - $HPAUgfqkInsquNcv)))) + ((((46 * $FawqemuyBmsawwOHZu) * 53) * -50) - 10118)))) * ((((-780 * $vqIPLFNhrODYOdbmYl) * ((((((((2 + (((((($LEmnzzpePRBsXpSczHuel - $tGRbbBukDU) + $WiXVRGlNgyS) * -244449) * $HjkAVKEKmaLVbtBcFT) * 859))) - $DDnVDvxasyZGaH) + $tGRbbBukDU) * 799) * -8652)) * (((($YTANJGNkttH * $YTANJGNkttH) * -85373) * -802210) - $tGRbbBukDU)))) * ((((((($OSmhCCiVVcvaoDlx + ((((((-2031 - 4331) - -2) * $HPAUgfqkInsquNcv) + $KTYbPJqBBiAcptx) - -244607))) * $BkyEihFJBoLlc) + $BDXwthxItR) * 8)) * (($cvZBawIacuX * $SNDYinOatvVRp) - 727)))))) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $LEcjISrNC = (((((((-809 + $SNDYinOatvVRp) - $ejrThZkPCAQIEm) * (((((($QLizooERIru * $VkqtaafnKLPLPjl) * $HjkAVKEKmaLVbtBcFT) + -7) + $keEoMANEKklErqkS) * 848498))) + (((($FawqemuyBmsawwOHZu + $WjSVLmvOVInmUrVgua) - $lxbwosjsc) + -594))) + $pZTjfifajVwieNsXpLR)) * ((((($WjSVLmvOVInmUrVgua + $ccHRSZAjBHKVLIoy) * $QLizooERIru) - 4) * -61874) * $xJgLSmCGExgpDeuwGs)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $tFbknODqZPoYEsW = ((((($FawqemuyBmsawwOHZu + -9065) - $AAhEbgCCcmlT) * $HjkAVKEKmaLVbtBcFT) + $LEcjISrNC) + -215) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $KnBvQNIHSMXTUJskYJcnB = ((((-6972 - $FawqemuyBmsawwOHZu) - -5) - -9588) + $aUvphQevd) |
Source: svchost.exe, 00000013.00000002.2751171982.000001A7A5213000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW@$# |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((51452 -le $xJgLSmCGExgpDeuwGs) -and ($FetNiyptiqwiiSW -gt $FawqemuyBmsawwOHZu)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = (((($tGRbbBukDU + $KTYbPJqBBiAcptx) * -93) + (((((($BhnfWCjCT + -169937) * $aUvphQevd) + $BkyEihFJBoLlc) * -81) * 1))) + -993) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $OSmhCCiVVcvaoDlx = (((($FawqemuyBmsawwOHZu * 29) + ((((((-86323 - $bvNcHjfwFu) * 9221) * $tGRbbBukDU) * 172) - 9380)))) * (((($LEmnzzpePRBsXpSczHuel - -481) * 256) + -5658) - 85)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: powershell.exe, 00000000.00000002.2262639105.0000000005196000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: FawqemuyBmsawwOHZu |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $keEoMANEKklErqkS = ((($vqIPLFNhrODYOdbmYl - (((((((128 + -900) + $YjwYiuvYpNuZt) - (((((($oeDgCMrdUrTnYrZ * 16457) - $BpmVieflXB) + 166863) + $aAgxKPHokoeshJGNDq) * $lxbwosjsc))) - 440026)) + (((($vqIPLFNhrODYOdbmYl * 31) + 9898) * $QzFGrXKuVgcPFQV) + $FawqemuyBmsawwOHZu)))) * ((((($OSmhCCiVVcvaoDlx * -9) - (((((($LEmnzzpePRBsXpSczHuel - 3876) + $QUsnODxygywaKYx) + $BhnfWCjCT) + 8) * $zppOCxempWOc)))) + (($pZunsUehIG * -7) - 7505)))) + (((((((8 - (((($nThZRFHczodCQIjn * $WjSVLmvOVInmUrVgua) + $eaEMrGlxnEWQmjDHR) * $aUvphQevd))) * $eSGXcVDTWCrHpHdd) - $dooTFEceTgfjImnXl) - 3164)) - (((8685 - -772162) - $YTANJGNkttH) - $eSGXcVDTWCrHpHdd)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $nThZRFHczodCQIjn = (((((59153 - $zppOCxempWOc) + $OSmhCCiVVcvaoDlx) + $QUsnODxygywaKYx) - ((((($FawqemuyBmsawwOHZu - 2630) + $HjkAVKEKmaLVbtBcFT)) * ((($ukDbGXPMFWbsRJLfkfBGE - 65945) * $LEmnzzpePRBsXpSczHuel) + -821524)))) * 649809) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $AAhEbgCCcmlT = (((((1 + $KTYbPJqBBiAcptx) * (((((((($lxbwosjsc - $feiJBcWxyNQPnmQF) - 70863) + -42) * $pZTjfifajVwieNsXpLR) * ((((($isXPtwPNlizAuJTRNJSR - 893) - 48824) - -653307) - $feiJBcWxyNQPnmQF)))) - ((($OSmhCCiVVcvaoDlx + $zeQQRcnYfkaLCv) * 2) * $FawqemuyBmsawwOHZu)))) + -8) - $WjSVLmvOVInmUrVgua) + ((((((-80505 * (((3908 - 4) + 385))) - (((-3621 + $aAgxKPHokoeshJGNDq) + $HjkAVKEKmaLVbtBcFT))) * $OSmhCCiVVcvaoDlx) + (((($LEcjISrNC * $SNDYinOatvVRp) - $QUsnODxygywaKYx) * $vqIPLFNhrODYOdbmYl))) + -73))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $YjwYiuvYpNuZt = (((($keEoMANEKklErqkS - $SNDYinOatvVRp) * $FawqemuyBmsawwOHZu) - $WOwGSKBvgxtdHIYcrZdL) + (((((($bvNcHjfwFu - 5774) - $aUvphQevd) * ((((($aUvphQevd - 48) + $QzFGrXKuVgcPFQV) * $jRiEEMSDahtDXRX) * 2)))) + ((((((54 * (((($KnBvQNIHSMXTUJskYJcnB * -18377) + $DDnVDvxasyZGaH) * 3))) - -2) * ((((-2928 + 926) - $xJgLSmCGExgpDeuwGs) * 999))) + $pZTjfifajVwieNsXpLR)) * (((51606 + -86439) - 40937) * $clxPhsvxCmfLqRq))))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $cvZBawIacuX = ((((-698521 - 302) + -5208) + $tFbknODqZPoYEsW) * $FawqemuyBmsawwOHZu) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $YjwYiuvYpNuZt = ((-290 + $xAuYKQHHwEukuiZWRKEXE) + ((((((8918 - (((($BDXwthxItR * 189206) - (((96 - 17) + $ljKWwLiwvNQFdMQABBdY))) + $zeQQRcnYfkaLCv))) + 66564) * ((($zeQQRcnYfkaLCv + ((((-6 + $FetNiyptiqwiiSW) + $KnBvQNIHSMXTUJskYJcnB) - $nBYzxRGjtDuHYTVdJVVxn))) - $aUvphQevd)))) + (((((6325 - $HwezPbTrqRzEPpxUzbr) * (((((($HjkAVKEKmaLVbtBcFT * $eaEMrGlxnEWQmjDHR) * 474) - $xJgLSmCGExgpDeuwGs) - -6) + -79))) + ((((($ccHRSZAjBHKVLIoy * 45346) - $YTANJGNkttH) + $isXPtwPNlizAuJTRNJSR) + $pZunsUehIG))) - ((((((-908 + 4961) + -2196) + -77) - $HwezPbTrqRzEPpxUzbr) + $FawqemuyBmsawwOHZu))) - 52670)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = (($jRiEEMSDahtDXRX - (((((($yycCLpGMIMmv + $aAgxKPHokoeshJGNDq) + $AAhEbgCCcmlT) * $HjkAVKEKmaLVbtBcFT)) + (((-4 + $dooTFEceTgfjImnXl) + -505) + $BpmVieflXB)))) + $eaEMrGlxnEWQmjDHR) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((-114 -eq $FawqemuyBmsawwOHZu) -and (570531 -ne $ljKWwLiwvNQFdMQABBdY) -and (-94 -ge $OkhFnQfPd)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $QLizooERIru = (((($ukDbGXPMFWbsRJLfkfBGE * $BhnfWCjCT) + -689)) * ((((((8 + ((((-4336 - (((($OSmhCCiVVcvaoDlx - $BkyEihFJBoLlc) + -96637) + -15141))) - ((($LEcjISrNC - $BkyEihFJBoLlc) + 86))) * (((($BhnfWCjCT + 846) + $OSmhCCiVVcvaoDlx) - -620))))) - (((((-225 - $lxbwosjsc) + $BkyEihFJBoLlc)) + ((((($bvNcHjfwFu + 60) - $VkqtaafnKLPLPjl) + $zeQQRcnYfkaLCv) - $KTYbPJqBBiAcptx) * $FawqemuyBmsawwOHZu)))) * -390) * (((((((-459165 + $aAgxKPHokoeshJGNDq) * $isXPtwPNlizAuJTRNJSR) + -99) * (((($BDXwthxItR - -677038) + -363538) - $aUvphQevd)))) + ((((($vqIPLFNhrODYOdbmYl - $bvNcHjfwFu) + $YTANJGNkttH) - $DDnVDvxasyZGaH) + -3627) + $VkqtaafnKLPLPjl))))) * (($ukDbGXPMFWbsRJLfkfBGE * $VkqtaafnKLPLPjl) * (((((($ejrThZkPCAQIEm + $ukDbGXPMFWbsRJLfkfBGE) + $FetNiyptiqwiiSW) * 96353) + 3594) + 87))))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $viDEAeFhykOSE = ((($aUvphQevd * $AAhEbgCCcmlT) + -63235) - $FawqemuyBmsawwOHZu) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = (((((-139 - $BhnfWCjCT) - -7147) * $xJgLSmCGExgpDeuwGs)) + ((((($BDXwthxItR * -2462) + (((((($isXPtwPNlizAuJTRNJSR * $FetNiyptiqwiiSW) - 1911) - -3) - $FawqemuyBmsawwOHZu) - $OSmhCCiVVcvaoDlx))) - ((((-168484 * 6674) - $LEcjISrNC) * $KnBvQNIHSMXTUJskYJcnB))) * -301) - ((((($isXPtwPNlizAuJTRNJSR + $LEcjISrNC) - $VnIeYxcKsDXfxF) + -54840) - 99)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $aUvphQevd = (((($bvNcHjfwFu + ((((((4 + $WOwGSKBvgxtdHIYcrZdL) + $FawqemuyBmsawwOHZu) - -6) + -300084) + $YTANJGNkttH))) + 241)) + ((($KnBvQNIHSMXTUJskYJcnB + $VkqtaafnKLPLPjl) * $keEoMANEKklErqkS) * 27)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = ((((3093 - -879506) * $bvNcHjfwFu)) * (((((890 - 81) * ((((128 + 79) - (((((7649 - 34060) * $bvNcHjfwFu) + -388714) * 6231))) - $SNDYinOatvVRp))) - 0) * 92) - $ejrThZkPCAQIEm)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $LEcjISrNC = ((((($BpmVieflXB - ((((0 + (((1109 + -10838) - $TBgUhpZAusN))) * 62) - -768444))) * $FawqemuyBmsawwOHZu) * $lQdSfJKZnepxf)) - (((($oeDgCMrdUrTnYrZ + ((((($ukDbGXPMFWbsRJLfkfBGE * $HPAUgfqkInsquNcv) - 8420) + $QLizooERIru) + (((988 - $cvZBawIacuX) + -131918))))) * (((((($EOCjqUiFVdupblu * (((((($keEoMANEKklErqkS + $gsRwOcOmjjUpCXTcsHn) - 1930) * $coHFkxmaSTBQmOca) + $miiwIudSbQSnYRd) - $ejrThZkPCAQIEm))) - 5546) * ((($HjkAVKEKmaLVbtBcFT + $feiJBcWxyNQPnmQF) * $coHFkxmaSTBQmOca))) + (((((($gsRwOcOmjjUpCXTcsHn + -2199) * $pMVAdIQLxexWYTiOxYHwd) - -28215) + 1353) * -218))) * 55963))) * -736) * $HjkAVKEKmaLVbtBcFT)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $nThZRFHczodCQIjn = (((((220 - ((((((-94356 * -5719) * $BDXwthxItR) + ((((((829369 - $FawqemuyBmsawwOHZu) - 5) - $isXPtwPNlizAuJTRNJSR) * $zppOCxempWOc) - $QLizooERIru)))) * (($QLizooERIru - $pZTjfifajVwieNsXpLR) * -7007)))) * $pZunsUehIG) + -6)) * (((($feiJBcWxyNQPnmQF - $nThZRFHczodCQIjn) - 7363) * $BhnfWCjCT) * $tGRbbBukDU)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = (((((-6293 - -7303) * $vqIPLFNhrODYOdbmYl) - ((((($FetNiyptiqwiiSW * 881) + $uZjFCHCuwgMRmVuD)) * ((((((($KnBvQNIHSMXTUJskYJcnB - 40) - ((((((-94 - $FawqemuyBmsawwOHZu) * -52) * $BkyEihFJBoLlc) * 67445) - $zeQQRcnYfkaLCv))) - ((((($BhnfWCjCT * -44369) * -9194) * -273) * 80961))) - $isXPtwPNlizAuJTRNJSR) * ((($KnBvQNIHSMXTUJskYJcnB * $DDnVDvxasyZGaH) - $BhnfWCjCT)))) - (($BDXwthxItR - 371863) - $WjSVLmvOVInmUrVgua)))))) * ((((((($YTANJGNkttH - 915) + ((((85100 * -6) + -35842) + -4160))) + $SNDYinOatvVRp) - 6) + $KnBvQNIHSMXTUJskYJcnB)) + ((53137 * -45909) + $xJgLSmCGExgpDeuwGs))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $KnBvQNIHSMXTUJskYJcnB = ((((($BkyEihFJBoLlc + (((($bvNcHjfwFu * $nBYzxRGjtDuHYTVdJVVxn) + $nBYzxRGjtDuHYTVdJVVxn) * -7065))) * $QLizooERIru) - -351)) - (((($YTANJGNkttH - 772) + -51925) + $FawqemuyBmsawwOHZu) + -87)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $ljKWwLiwvNQFdMQABBdY = ((((($FawqemuyBmsawwOHZu + (((($HPAUgfqkInsquNcv - ((((($ljKWwLiwvNQFdMQABBdY * (((($ukDbGXPMFWbsRJLfkfBGE + $BpmVieflXB) - -8251) * -2))) + -514) + $WOwGSKBvgxtdHIYcrZdL) - 6))) * -51415) + 631))) * (((-6 + $aUvphQevd) - $jRiEEMSDahtDXRX))) + $FetNiyptiqwiiSW) - ((((((((-135 - -131203) - $aUvphQevd) * $SNDYinOatvVRp) * $zppOCxempWOc) + $FawqemuyBmsawwOHZu)) - ((((((-78998 * $BhnfWCjCT) + 250) + $gwepfEVRJEIYqR) + (((($gwepfEVRJEIYqR - $ccHRSZAjBHKVLIoy) + $FawqemuyBmsawwOHZu) * 762)))) + ((-1313 - $aAgxKPHokoeshJGNDq) * 50))))) + 6) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $VnIeYxcKsDXfxF = (((((($YTANJGNkttH * (((((((62184 * $vcorqjBuSFOtoNbA) + -5769) * $aUvphQevd) - -35442)) * ((((($ljKWwLiwvNQFdMQABBdY + $FawqemuyBmsawwOHZu) * $zppOCxempWOc) + $zppOCxempWOc) * ((($QLizooERIru + $gwepfEVRJEIYqR) * 100997))) - $LEmnzzpePRBsXpSczHuel)))) * $tFbknODqZPoYEsW) + ((($SNDYinOatvVRp - $QzFGrXKuVgcPFQV) - 137854))) * (((-978303 - $LEcjISrNC) - $QzFGrXKuVgcPFQV)))) + (((($HjkAVKEKmaLVbtBcFT - $zeQQRcnYfkaLCv) - (((((((44306 + ((((((-276509 - $QLizooERIru) + -42003) + $isXPtwPNlizAuJTRNJSR) * $zYPpmoxLomkKZJtCicT) + $lxbwosjsc))) * $WOwGSKBvgxtdHIYcrZdL) + 82090) * 2348)) - ((39 + $zeQQRcnYfkaLCv) * $xVAhdipiHTyyKaaPS))))) * ((($ccHRSZAjBHKVLIoy * (((((26 * $feiJBcWxyNQPnmQF) - $zYPpmoxLomkKZJtCicT) - -22) * $BpmVieflXB))) + $BhnfWCjCT) - 9))) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $gwepfEVRJEIYqR = ((((9513 + (((($tGRbbBukDU - ((((655 + -26) + $nBYzxRGjtDuHYTVdJVVxn) + $gwepfEVRJEIYqR))) + 66060) * -324668))) - $BhnfWCjCT) + $xJgLSmCGExgpDeuwGs) + ((((((((6 + (((-92114 + $FawqemuyBmsawwOHZu) + 912855))) + -53) * 6922) - $LEcjISrNC) + -303)) - ((((((-6 + ((((((975875 + $KTYbPJqBBiAcptx) * $SNDYinOatvVRp) * -313447) * $HPAUgfqkInsquNcv) - $nThZRFHczodCQIjn))) - $HPAUgfqkInsquNcv) * ((((($KTYbPJqBBiAcptx - 10) + -44) + -903585) - $BkyEihFJBoLlc))) * ((($eaEMrGlxnEWQmjDHR - $FawqemuyBmsawwOHZu) - $bvNcHjfwFu)))) * (($aAgxKPHokoeshJGNDq - $zeQQRcnYfkaLCv) + $BhnfWCjCT))))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($FawqemuyBmsawwOHZu -le -774972) -and (-7 -lt 4)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $WjSVLmvOVInmUrVgua = (((1084 + $FawqemuyBmsawwOHZu) - 97) + 3) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $QzFGrXKuVgcPFQV = (((((($FetNiyptiqwiiSW + $xVAhdipiHTyyKaaPS) * -6) - $vcorqjBuSFOtoNbA) * ((((($aUvphQevd * 40307) - $HwezPbTrqRzEPpxUzbr)) - ((($YTANJGNkttH + $HjkAVKEKmaLVbtBcFT) * 69760) * 975))))) - (((($ljKWwLiwvNQFdMQABBdY - $feiJBcWxyNQPnmQF) + (((((($ljKWwLiwvNQFdMQABBdY * $xVAhdipiHTyyKaaPS) + -6516) + -32) - -977) - $FawqemuyBmsawwOHZu))) + ((((($oeDgCMrdUrTnYrZ * 6845) - -35280) * 53) + -17))) - $bvNcHjfwFu)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $aUvphQevd = (((((($xJgLSmCGExgpDeuwGs + 76) * $tGRbbBukDU) + $FawqemuyBmsawwOHZu) + 47)) - ((((-1277 + -61) - $KnBvQNIHSMXTUJskYJcnB) + $VkqtaafnKLPLPjl) * -546588)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $miiwIudSbQSnYRd = ((((((-395 * ((($WOwGSKBvgxtdHIYcrZdL + ((((208775 + $ukDbGXPMFWbsRJLfkfBGE) * -944) - $uZjFCHCuwgMRmVuD))) + ((((((-4 * 2) * $FawqemuyBmsawwOHZu) + 277) + -1851) - $BLaMzSdCgCFjPG))))) - (((-432 * 32) + (((((($ukDbGXPMFWbsRJLfkfBGE - -364259) + -294) * -9) - 1220) * -448015))))) * (((($DDnVDvxasyZGaH - $qLjXIPrdEbvgJxTh) * -8990) * $FawqemuyBmsawwOHZu))) * $isXPtwPNlizAuJTRNJSR)) * (($ccHRSZAjBHKVLIoy - 0) - -9)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $SNDYinOatvVRp = (((((((136459 - (((($BhnfWCjCT - 1) - 93) - $LEcjISrNC))) + 794) - (((($FawqemuyBmsawwOHZu * 6) - 999814) - $ccHRSZAjBHKVLIoy))) - 364) * -14409)) + (((((-86 * $keEoMANEKklErqkS) * -8) * $pZTjfifajVwieNsXpLR) * $DDnVDvxasyZGaH) + 73470)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $eSGXcVDTWCrHpHdd = (((((((-844039 + ((((($WOwGSKBvgxtdHIYcrZdL - $cvZBawIacuX) + $viDEAeFhykOSE) - $FnbHLOgPym) - -311048))) + 27) + ((((((($pZunsUehIG * -575514) - 96462) + 74000) * $nBYzxRGjtDuHYTVdJVVxn)) * (((((7108 + $BkyEihFJBoLlc) + $zeQQRcnYfkaLCv) * -72995) - $FawqemuyBmsawwOHZu) - -32405)))) * -38) - -77852)) * (((($tGRbbBukDU * $zYPpmoxLomkKZJtCicT) - ((($gwepfEVRJEIYqR * 171000) * 853))) + 94) + (((($zYPpmoxLomkKZJtCicT + $gwepfEVRJEIYqR) * $pZunsUehIG) + $viDEAeFhykOSE)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $nBYzxRGjtDuHYTVdJVVxn = ((($BkyEihFJBoLlc + 9) - ((((((((94 - (((((-88 + -6441) + ((((((525 + $aUvphQevd) * $VnIeYxcKsDXfxF) + -3734) + $YTANJGNkttH) * -469))) + 22) * -7))) * $WOwGSKBvgxtdHIYcrZdL) * $xJgLSmCGExgpDeuwGs) + $SNDYinOatvVRp) - -2812)) - ((((($YTANJGNkttH + -903) + $FawqemuyBmsawwOHZu) * (((-2075 * $uZjFCHCuwgMRmVuD) * $FetNiyptiqwiiSW)))) - ((($uZjFCHCuwgMRmVuD - $isXPtwPNlizAuJTRNJSR) * $tGRbbBukDU) * -1))))) + $WjSVLmvOVInmUrVgua) |
Source: svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: EnableGuestVmNetworkConnectivity |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((-309117 -ge $FawqemuyBmsawwOHZu) -or ($BkyEihFJBoLlc -eq $SNDYinOatvVRp) -or ($yycCLpGMIMmv -gt 49802) -or ($FetNiyptiqwiiSW -le 9722)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $BhnfWCjCT = ((((($WjSVLmvOVInmUrVgua + $FawqemuyBmsawwOHZu) + $FawqemuyBmsawwOHZu) * $xJgLSmCGExgpDeuwGs)) - ((((-678669 - 95) * ((((($DDnVDvxasyZGaH - -7) - ((((((4746 - 38724) * $zeQQRcnYfkaLCv) + $WjSVLmvOVInmUrVgua) * $WjSVLmvOVInmUrVgua) * $KnBvQNIHSMXTUJskYJcnB))) - -3) - (((-7 * $bvNcHjfwFu) + $ukDbGXPMFWbsRJLfkfBGE)))))) * ((((((-8 + (((($VkqtaafnKLPLPjl + $KnBvQNIHSMXTUJskYJcnB) + $WjSVLmvOVInmUrVgua) - $VnIeYxcKsDXfxF))) + (((-300675 * 53) - $WjSVLmvOVInmUrVgua))) * $VnIeYxcKsDXfxF) + ((($BDXwthxItR - $LEcjISrNC) + 33608)))) * ((($VkqtaafnKLPLPjl - $FetNiyptiqwiiSW) * $FawqemuyBmsawwOHZu) * -89)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $SNDYinOatvVRp = ((((((-69802 - 2) * $WOwGSKBvgxtdHIYcrZdL) + (((((($feiJBcWxyNQPnmQF * 15505) - 5079) + $zeQQRcnYfkaLCv) + $aUvphQevd) + (((((($BDXwthxItR * (((-55538 + $WjSVLmvOVInmUrVgua) + $FawqemuyBmsawwOHZu))) + ((((5 + $xJgLSmCGExgpDeuwGs) * $ejrThZkPCAQIEm) + 62922))) * ((((503 * 48) * 32360) + 56026)))) - (($BkyEihFJBoLlc - 625) + 1)))))) * -36)) - (((((5 * 5) * $ukDbGXPMFWbsRJLfkfBGE) * (((((-13831 * -58) + (((($xJgLSmCGExgpDeuwGs * 4256) - $ukDbGXPMFWbsRJLfkfBGE) * 454)))) - (((-543284 - $DDnVDvxasyZGaH) - $SNDYinOatvVRp) - $ejrThZkPCAQIEm)))) + 55) - $ejrThZkPCAQIEm)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $BkyEihFJBoLlc = (((((-3 * $feiJBcWxyNQPnmQF) * $WjSVLmvOVInmUrVgua) * $vqIPLFNhrODYOdbmYl) - -8269) * (((($HwezPbTrqRzEPpxUzbr + ((((((78035 * ((((($WiXVRGlNgyS + 6) * -7) - $FawqemuyBmsawwOHZu) - $pZTjfifajVwieNsXpLR))) * ((((-227 - 0) - $zeQQRcnYfkaLCv) * $ljKWwLiwvNQFdMQABBdY))) - ((($zeQQRcnYfkaLCv * $VkqtaafnKLPLPjl) + 23292))) - -2) - -6299))) * $ljKWwLiwvNQFdMQABBdY) + $OSmhCCiVVcvaoDlx))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $HwezPbTrqRzEPpxUzbr = ((((($uZjFCHCuwgMRmVuD - (((((((($YjwYiuvYpNuZt + $yycCLpGMIMmv) - $SDnIVLdAPekHPz) * $BpmVieflXB) * $tGRbbBukDU) * ((((46932 + $VnIeYxcKsDXfxF) - -4) * ((($uZjFCHCuwgMRmVuD - 14905) - $jRiEEMSDahtDXRX)))))) * ((((((-994 - -19) + (((((86 + -6) + 8) * -47272) * -65176))) - $WjSVLmvOVInmUrVgua) + (((1597 + $gsRwOcOmjjUpCXTcsHn) * $KTYbPJqBBiAcptx)))) * (($SNDYinOatvVRp - 7241) - $yycCLpGMIMmv))))) - -619299) - $FawqemuyBmsawwOHZu)) - (((((917 * -91377) - $xVAhdipiHTyyKaaPS) * -58160) * -5) + $BhnfWCjCT)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $VkqtaafnKLPLPjl = (($BhnfWCjCT * ((((((($VkqtaafnKLPLPjl * $isXPtwPNlizAuJTRNJSR) + ((((((-21 * $uZjFCHCuwgMRmVuD) * $WOwGSKBvgxtdHIYcrZdL) * (((-398166 * $aUvphQevd) - -6588)))) - ((-52 + $FawqemuyBmsawwOHZu) - 18)))) + ((((((722047 - -5) * $FetNiyptiqwiiSW) * ((((-407222 * -8819) * 0) - $VnIeYxcKsDXfxF))) - 65) - 198480))) + ((((($vqIPLFNhrODYOdbmYl * ((((8620 - 46859) * $xJgLSmCGExgpDeuwGs) + 1211))) - -72713) - $ukDbGXPMFWbsRJLfkfBGE) - -3)))) - (((($SNDYinOatvVRp + 413) + $FetNiyptiqwiiSW)) + (((892 - $DDnVDvxasyZGaH) + $BhnfWCjCT) * $vqIPLFNhrODYOdbmYl))))) + $BhnfWCjCT) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $QzFGrXKuVgcPFQV = ((((48440 * 157) * $BDXwthxItR) - ((($oeDgCMrdUrTnYrZ * ((((($aAgxKPHokoeshJGNDq * $KTYbPJqBBiAcptx) * $pZunsUehIG) * -341966) - $pZunsUehIG))) - $FawqemuyBmsawwOHZu))) - $WjSVLmvOVInmUrVgua) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $UFxRFzGIi = (((-49 - ((((($oeDgCMrdUrTnYrZ * ((((((4 - $WiXVRGlNgyS) - -55095) * 15) * $miiwIudSbQSnYRd) * 6171))) - ((((((((-200 - 83) - ((($miiwIudSbQSnYRd * $TBgUhpZAusN) * $lNcsnUoYskCNfoHfdVnzd))) + 1900) - 37) + -60872)) * (($MuNChZebK - $FawqemuyBmsawwOHZu) - $eaEMrGlxnEWQmjDHR)))) * -116024) + $bABhRHoDjnMXwTzxW))) + $MuNChZebK) + 721) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $ukDbGXPMFWbsRJLfkfBGE = ((($FawqemuyBmsawwOHZu * 6) + (((((201 - -57) * $VkqtaafnKLPLPjl) * -6) - $BhnfWCjCT))) - $VnIeYxcKsDXfxF) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((197 -ge 55619) -or ($FawqemuyBmsawwOHZu -gt 17) -or (-20 -eq 248) -or (-9658 -ge -8855)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $SZzxWNxjTVCtBKLGZMHP = (((((($dooTFEceTgfjImnXl * 1) - $dooTFEceTgfjImnXl) + 26) + $KnBvQNIHSMXTUJskYJcnB)) * ((((307229 + 787980) - $FawqemuyBmsawwOHZu) * $ljKWwLiwvNQFdMQABBdY) * $SZzxWNxjTVCtBKLGZMHP)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = (($MuNChZebK * $lQdSfJKZnepxf) * $YTANJGNkttH) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((-56656 -le $FawqemuyBmsawwOHZu) -and ($KnBvQNIHSMXTUJskYJcnB -ne $DDnVDvxasyZGaH) -and (-1 -gt -46)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $ccHRSZAjBHKVLIoy = ((((($MuNChZebK * ((((($jRiEEMSDahtDXRX * $pMVAdIQLxexWYTiOxYHwd) + $vqIPLFNhrODYOdbmYl) - 4398) + $QUsnODxygywaKYx))) - ((((((798 + 7788) - $gsRwOcOmjjUpCXTcsHn) - $BDXwthxItR)) * (((((79331 - $dooTFEceTgfjImnXl) + $tGRbbBukDU) + $nThZRFHczodCQIjn) + $HjkAVKEKmaLVbtBcFT) * 39919)))) - $FawqemuyBmsawwOHZu)) - ((((((($nThZRFHczodCQIjn * 5453) + 802) - $pZunsUehIG) - -266) + $keEoMANEKklErqkS)) + (((((-5389 * -2) - $YjwYiuvYpNuZt) * $UFxRFzGIi) * -319) + $FnbHLOgPym))) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $gsRwOcOmjjUpCXTcsHn = (((((($oeDgCMrdUrTnYrZ + 235553) + ((((((((3222 - ((((((((-94 - -6405) - $gsRwOcOmjjUpCXTcsHn) - 16841) * (((((($nThZRFHczodCQIjn + 93) + -614796) - $vqIPLFNhrODYOdbmYl) * $SNDYinOatvVRp) - 74444))) - $zppOCxempWOc)) * ((63597 * $FawqemuyBmsawwOHZu) + $xJgLSmCGExgpDeuwGs)))) - $BDXwthxItR) + $HjkAVKEKmaLVbtBcFT) - 569972) + 89128)) - ((((-7 - 60480) * $xJgLSmCGExgpDeuwGs) * ((((((40659 * $AAhEbgCCcmlT) * $AAhEbgCCcmlT) + $QLizooERIru) - $QUsnODxygywaKYx) - -373967))) - 39)))) + $SNDYinOatvVRp) - $BDXwthxItR)) - (((($aAgxKPHokoeshJGNDq * (((((($LEcjISrNC - $keEoMANEKklErqkS) + ((($BkyEihFJBoLlc + $YjwYiuvYpNuZt) + 1392))) - (((((-580 - -206) - $KnBvQNIHSMXTUJskYJcnB) + $feiJBcWxyNQPnmQF) + -540)))) - ((-93 - $tGRbbBukDU) - $LEmnzzpePRBsXpSczHuel)))) * 0) - $keEoMANEKklErqkS) - -8104)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($nBYzxRGjtDuHYTVdJVVxn -le -9) -or (-6903 -lt 6) -or ($FawqemuyBmsawwOHZu -eq 6)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((-3 -le $FawqemuyBmsawwOHZu) -and ($dooTFEceTgfjImnXl -eq $BpmVieflXB)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $isXPtwPNlizAuJTRNJSR = (((((-54567 - -201) * $KnBvQNIHSMXTUJskYJcnB) - 2) * (((((($aUvphQevd * (((((($isXPtwPNlizAuJTRNJSR * (((((($LEmnzzpePRBsXpSczHuel * 9922) - $uZjFCHCuwgMRmVuD) * $ejrThZkPCAQIEm) * -43917) - -620211))) + $HwezPbTrqRzEPpxUzbr) + -948)) + ((((($pZTjfifajVwieNsXpLR - $KnBvQNIHSMXTUJskYJcnB) + $QUsnODxygywaKYx) * 7) + $ejrThZkPCAQIEm) - $WjSVLmvOVInmUrVgua)))) - (((((($ccHRSZAjBHKVLIoy * $SNDYinOatvVRp) * ((((-16 + $VnIeYxcKsDXfxF) * 888) * 484968))) * ((((($BkyEihFJBoLlc * $FawqemuyBmsawwOHZu) * $zppOCxempWOc) + $KTYbPJqBBiAcptx) * $KnBvQNIHSMXTUJskYJcnB))) * 4) - $KnBvQNIHSMXTUJskYJcnB))) + $nBYzxRGjtDuHYTVdJVVxn) - -86970) - -85))) * $ukDbGXPMFWbsRJLfkfBGE) |
Source: svchost.exe, 0000000F.00000002.2333325934.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.2751234464.000001A7A522F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.2751171982.000001A7A5213000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $LEcjISrNC = (($xAuYKQHHwEukuiZWRKEXE * $FawqemuyBmsawwOHZu) - (((($LEcjISrNC + $QUsnODxygywaKYx) * -37061) + 5))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($YZiyXAgPVGzsLWNvRydn -gt 748) -and (-9 -le 257289) -and (-4987 -ne 49607) -and ($tGRbbBukDU -le $FawqemuyBmsawwOHZu)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $AAhEbgCCcmlT = (((((($QLizooERIru * -3879) * -985108) - (((((($BDXwthxItR - $BDXwthxItR) * 15) * -4) - (((((18 * -5600) + $FetNiyptiqwiiSW) + 73) - 9660))) * $feiJBcWxyNQPnmQF))) * 668121)) * ((((((($YTANJGNkttH * (((($KTYbPJqBBiAcptx * 8352) * -932) + $ccHRSZAjBHKVLIoy))) - $tGRbbBukDU) + -60117) * $FawqemuyBmsawwOHZu) + $nBYzxRGjtDuHYTVdJVVxn)) - ((((($FetNiyptiqwiiSW * -55) + 3853) + $HjkAVKEKmaLVbtBcFT) - 693622) - $BhnfWCjCT))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($WiXVRGlNgyS -eq 260) -and ($zeQQRcnYfkaLCv -eq $AAhEbgCCcmlT) -and ($AAhEbgCCcmlT -eq $FawqemuyBmsawwOHZu)) { |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($BhnfWCjCT -lt -56962) -and (-9894 -eq 89) -and (645 -lt 353053) -and ($FawqemuyBmsawwOHZu -ne $BkyEihFJBoLlc)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $DDnVDvxasyZGaH = (($isXPtwPNlizAuJTRNJSR + $SNDYinOatvVRp) + $FawqemuyBmsawwOHZu) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((7 -gt $FawqemuyBmsawwOHZu) -or ($DwXHSGGMiILc -lt $VnIeYxcKsDXfxF)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $BDXwthxItR = ((($KnBvQNIHSMXTUJskYJcnB - ((((-9656 * $WOwGSKBvgxtdHIYcrZdL) + -50) - $YTANJGNkttH))) - ((((-35516 * -107) + -195) * $FawqemuyBmsawwOHZu))) - $xJgLSmCGExgpDeuwGs) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $aAgxKPHokoeshJGNDq = (((($ukDbGXPMFWbsRJLfkfBGE - $VkqtaafnKLPLPjl) + $uZjFCHCuwgMRmVuD) + (((((($SNDYinOatvVRp * $FawqemuyBmsawwOHZu) + -2) * 96) - 4528) - -13272))) + -93) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((-7 -ge 8056) -and (48649 -le $ejrThZkPCAQIEm) -and ($isXPtwPNlizAuJTRNJSR -gt $FawqemuyBmsawwOHZu)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((1458 -gt $BDXwthxItR) -or (-666 -eq $xJgLSmCGExgpDeuwGs) -or ($FawqemuyBmsawwOHZu -gt 22675)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($FawqemuyBmsawwOHZu -ne $aUvphQevd) -and ($bvNcHjfwFu -ge $BhnfWCjCT) -and ($QUsnODxygywaKYx -ge 46405) -and ($HPAUgfqkInsquNcv -ge -34)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = (((($BDXwthxItR - ((($xJgLSmCGExgpDeuwGs + $OSmhCCiVVcvaoDlx) - $OSmhCCiVVcvaoDlx))) + 8482)) * ((($vqIPLFNhrODYOdbmYl - $LEcjISrNC) - 896) * -4842)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if ((7436 -gt 1583) -and (-202 -le $KTYbPJqBBiAcptx) -and ($ccHRSZAjBHKVLIoy -gt $LEcjISrNC) -and ($FawqemuyBmsawwOHZu -ge $aAgxKPHokoeshJGNDq)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $WiXVRGlNgyS = (((((-394 - ((((60 * $keEoMANEKklErqkS) * -4596) + 67319))) - (((($ccHRSZAjBHKVLIoy * -313948) * $HjkAVKEKmaLVbtBcFT) + -8604))) - (((($feiJBcWxyNQPnmQF - -676994) * $zeQQRcnYfkaLCv) * $xJgLSmCGExgpDeuwGs))) * $zeQQRcnYfkaLCv) - $FawqemuyBmsawwOHZu) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $bvNcHjfwFu = (((((39611 + -699) - (((2 + $ukDbGXPMFWbsRJLfkfBGE) * 22))) * -7)) * (((((-3853 * $FawqemuyBmsawwOHZu) * 113) + 159411) + $ukDbGXPMFWbsRJLfkfBGE) * 0)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $xVAhdipiHTyyKaaPS = (((($DDnVDvxasyZGaH + $FawqemuyBmsawwOHZu) - $HjkAVKEKmaLVbtBcFT) + $ccHRSZAjBHKVLIoy) + 45) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $eaEMrGlxnEWQmjDHR = ((($bABhRHoDjnMXwTzxW * 617387) - (((((-450002 - ((($WjSVLmvOVInmUrVgua * -430396) * -163))) - -893) - (((76473 + $HwezPbTrqRzEPpxUzbr) + $FawqemuyBmsawwOHZu))) - $YTANJGNkttH))) + (((((($lxbwosjsc + $eaEMrGlxnEWQmjDHR) * 41840) * (((-5522 - $LEcjISrNC) - 8962))) - -886) * $pZunsUehIG))) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $TBgUhpZAusN = (((((75 * ((((($YjwYiuvYpNuZt + ((((($SDnIVLdAPekHPz * -123) - (((($BpmVieflXB * -767231) - 45641) - 845)))) * ((($FawqemuyBmsawwOHZu * -320) + $YTANJGNkttH) - $zYPpmoxLomkKZJtCicT)))) * 86176) - ((((($VnIeYxcKsDXfxF - -84) + 3877)) - (($VnIeYxcKsDXfxF * $BDXwthxItR) * -244468)))) * ((($lxbwosjsc * ((((($FawqemuyBmsawwOHZu - $zeQQRcnYfkaLCv) - 44) * 692) * $SDnIVLdAPekHPz))) + $KnBvQNIHSMXTUJskYJcnB))))) - (((2213 + (((((($WjSVLmvOVInmUrVgua - $SDnIVLdAPekHPz) - 46706) - -1) + 40) + -386949))) - -2044))) * 347117) + -96388) * -790) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $BDXwthxItR = ((((((-24 - -2723) - 6) * 38) - ((((2 - $FawqemuyBmsawwOHZu) - $OSmhCCiVVcvaoDlx) - 938842)))) + ((((($xJgLSmCGExgpDeuwGs + $FawqemuyBmsawwOHZu) - -62) - $vqIPLFNhrODYOdbmYl) * $WOwGSKBvgxtdHIYcrZdL) + -45)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $zeQQRcnYfkaLCv = (((((($BLaMzSdCgCFjPG * $VkqtaafnKLPLPjl) - (((((($nThZRFHczodCQIjn - $eSGXcVDTWCrHpHdd) * -67392) + $ccHRSZAjBHKVLIoy)) - ((((-6215 + -990) * 13) * $ccHRSZAjBHKVLIoy) * 838002)))) - ((((($zeQQRcnYfkaLCv * ((((44056 * 85822) + 6) - $gsRwOcOmjjUpCXTcsHn))) + $clxPhsvxCmfLqRq) * -3) + $coHFkxmaSTBQmOca))) * (((((($HjkAVKEKmaLVbtBcFT - ((((214988 * $isXPtwPNlizAuJTRNJSR) + -173) * $tFbknODqZPoYEsW))) - $FawqemuyBmsawwOHZu) * (((($oeDgCMrdUrTnYrZ * 313) * $BhnfWCjCT) - $gsRwOcOmjjUpCXTcsHn)))) + ((-733917 - $ccHRSZAjBHKVLIoy) + $QzFGrXKuVgcPFQV))))) + (((0 - 7) - ((((((-54611 * $jRiEEMSDahtDXRX) + $yycCLpGMIMmv) - $HwezPbTrqRzEPpxUzbr) - $xAuYKQHHwEukuiZWRKEXE) * 94560))) - (((((($isXPtwPNlizAuJTRNJSR + -8) + 5170) * $xAuYKQHHwEukuiZWRKEXE) - $nThZRFHczodCQIjn) + $clxPhsvxCmfLqRq)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = ((((((-558 - 8287) + -72) - 544132) * (((($pMVAdIQLxexWYTiOxYHwd - -2842) + $ccHRSZAjBHKVLIoy) - (((((($VnIeYxcKsDXfxF * -8) - $gsRwOcOmjjUpCXTcsHn) - $wAiTzzhxVrtXKiJXy) * $BLaMzSdCgCFjPG) * -39)))))) * (($BpmVieflXB * 87) - -4)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $feiJBcWxyNQPnmQF = (((((-807 + -40768) * (((-1031 * 9759) * -49))) * ((($DDnVDvxasyZGaH * $xJgLSmCGExgpDeuwGs) + $FawqemuyBmsawwOHZu))) - $YTANJGNkttH) - -9) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $xVAhdipiHTyyKaaPS = ((((-53 + 1829) - 913) * (((((0 * $QUsnODxygywaKYx) - $YTANJGNkttH) - $uZjFCHCuwgMRmVuD) * $FawqemuyBmsawwOHZu))) * (((($HjkAVKEKmaLVbtBcFT * -555) + $zppOCxempWOc) + 5))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $EOCjqUiFVdupblu = ((((($FawqemuyBmsawwOHZu * ((((($YZiyXAgPVGzsLWNvRydn + 39) * $cvZBawIacuX) + -726520) + $HwezPbTrqRzEPpxUzbr))) - ((((3 - $vqIPLFNhrODYOdbmYl) - 1) - $jRiEEMSDahtDXRX))) * $LEmnzzpePRBsXpSczHuel)) - ((((1346 * $feiJBcWxyNQPnmQF) - $MuNChZebK) * $XxlCVKuXJff) * -831)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $aAgxKPHokoeshJGNDq = ((((8317 + (((((((($YTANJGNkttH * $BhnfWCjCT) * $aAgxKPHokoeshJGNDq) + (((($vqIPLFNhrODYOdbmYl - 8) + $keEoMANEKklErqkS) * 4))) + $KnBvQNIHSMXTUJskYJcnB) - -7)) * (((((($bvNcHjfwFu * 391536) - 27) * (((((8728 - -22608) + -54746) + $zeQQRcnYfkaLCv) + $ejrThZkPCAQIEm))) - 924)) - ((($zeQQRcnYfkaLCv * $ukDbGXPMFWbsRJLfkfBGE) + -15002) * $zeQQRcnYfkaLCv))))) * ((((($FawqemuyBmsawwOHZu - (((((((($VnIeYxcKsDXfxF - 100340) + $BkyEihFJBoLlc) - 36) * -89) * $uZjFCHCuwgMRmVuD)) - ((($FetNiyptiqwiiSW * 65324) + $DDnVDvxasyZGaH) * $nBYzxRGjtDuHYTVdJVVxn)))) * -7)) + ((($pZTjfifajVwieNsXpLR + $BkyEihFJBoLlc) * (((18 - $FawqemuyBmsawwOHZu) + -1961))) - -1))))) + (((((((1 * ((((((-8 + ((($DDnVDvxasyZGaH - -394) * 1997))) * (((944876 - 420) + -8))) + 2) + -26904) * 67))) * $nBYzxRGjtDuHYTVdJVVxn) + -73) - -93) * -55)) + ((-69 * 67) - 8))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: if (($FawqemuyBmsawwOHZu -eq 898988) -and ($ejrThZkPCAQIEm -ne -8) -and (-886 -lt -3)) { |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $feiJBcWxyNQPnmQF = ((((((44314 + $DDnVDvxasyZGaH) - (((-27141 - 2) - 2164))) - $SNDYinOatvVRp) + ((((((-938 - $YTANJGNkttH) + $xJgLSmCGExgpDeuwGs) * $SNDYinOatvVRp)) - ((((-206 - $feiJBcWxyNQPnmQF) + 4107) * 6) * $VkqtaafnKLPLPjl))))) + (((((5688 + $FawqemuyBmsawwOHZu) - 2) * $FawqemuyBmsawwOHZu) + 781517) - (((((-89 * 463784) * -98351) * $VkqtaafnKLPLPjl) - 4)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $OSmhCCiVVcvaoDlx = (((((((-1 - (((((926049 * (((((-39280 + $VnIeYxcKsDXfxF) * $FetNiyptiqwiiSW)) - (((((53150 - $FetNiyptiqwiiSW) - 61758) - $LEcjISrNC) * $DDnVDvxasyZGaH) - -357)))) * (((((24293 * ((($KnBvQNIHSMXTUJskYJcnB + 42) * $WOwGSKBvgxtdHIYcrZdL))) - ((((7 + -23972) + 539) - $ukDbGXPMFWbsRJLfkfBGE))) + (((((-8670 - $zeQQRcnYfkaLCv) - -504626) * -4223) * -44198))) + $LEcjISrNC)))) * (((($feiJBcWxyNQPnmQF * $KnBvQNIHSMXTUJskYJcnB) - $BDXwthxItR)) - ((-951780 * $zeQQRcnYfkaLCv) - -3))))) + ((($FawqemuyBmsawwOHZu * 155390) + ((((((($FawqemuyBmsawwOHZu - $YTANJGNkttH) + $isXPtwPNlizAuJTRNJSR) + (((574 - -30526) - $xJgLSmCGExgpDeuwGs))) * -75)) * ((((($isXPtwPNlizAuJTRNJSR * $VkqtaafnKLPLPjl) - -260792) - $isXPtwPNlizAuJTRNJSR) * $BkyEihFJBoLlc) + -22843)))))) - $tGRbbBukDU) - 48) * 2361)) + ((((5 * (((-513050 - $WjSVLmvOVInmUrVgua) + $BkyEihFJBoLlc))) * $OSmhCCiVVcvaoDlx) - 362) * 835140)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $HwezPbTrqRzEPpxUzbr = (((((((443746 * 536) + -761) * (((($MuNChZebK + 7) + 33614) + $uZjFCHCuwgMRmVuD))) + -984) + ((((-7087 - 59) - $LEcjISrNC) * $FawqemuyBmsawwOHZu)))) * (($YZiyXAgPVGzsLWNvRydn * $HPAUgfqkInsquNcv) + $SNDYinOatvVRp)) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $uZjFCHCuwgMRmVuD = ((((($zeQQRcnYfkaLCv + (((57 - $feiJBcWxyNQPnmQF) + 0))) * 8) * $FetNiyptiqwiiSW) - 6) + ((((-28608 + $FawqemuyBmsawwOHZu) - $BhnfWCjCT) + $lxbwosjsc))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $wdiOzNWDJbtitMpyhtP = (((((871545 - $TBgUhpZAusN) + (((((-94 * -464) + $pZTjfifajVwieNsXpLR)) + ((((($TBgUhpZAusN + -4) * 185) - $BLaMzSdCgCFjPG) - $zppOCxempWOc) - $jRiEEMSDahtDXRX)))) - $zeQQRcnYfkaLCv)) + ((((((($HPAUgfqkInsquNcv * 2) * ((((2 * -629502) - 1) * $FawqemuyBmsawwOHZu))) + -21) + 99690) + ((((-613 + 61815) - $QLizooERIru) + 90)))) + ((($oeDgCMrdUrTnYrZ + $ljKWwLiwvNQFdMQABBdY) * 75212) * $eaEMrGlxnEWQmjDHR))) |
Source: svchost.exe, 0000000F.00000002.2333353936.0000000003012000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW( |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $FawqemuyBmsawwOHZu = ((((-9 * -404) - $VnIeYxcKsDXfxF) + (((($feiJBcWxyNQPnmQF * $VnIeYxcKsDXfxF) + $xJgLSmCGExgpDeuwGs) * $VkqtaafnKLPLPjl))) - $OSmhCCiVVcvaoDlx) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $oeDgCMrdUrTnYrZ = ((((((($OSmhCCiVVcvaoDlx - $QUsnODxygywaKYx) + (((-3672 * 434) * 593))) - ((((((-795768 * ((((((2474 + $YTANJGNkttH) - $pZunsUehIG) + ((($tFbknODqZPoYEsW - $vqIPLFNhrODYOdbmYl) - 2112)))) + (((56 - $QLizooERIru) + -34) * $aUvphQevd)))) - (((($aAgxKPHokoeshJGNDq * ((((($FawqemuyBmsawwOHZu + -7) * $jRiEEMSDahtDXRX) + $HjkAVKEKmaLVbtBcFT) + -911))) * $aAgxKPHokoeshJGNDq) * (((((-66 - -6) - $QzFGrXKuVgcPFQV) + $jRiEEMSDahtDXRX) + -1418))))) - $WiXVRGlNgyS) * ((((((-22681 + (((((-3889 * $tFbknODqZPoYEsW) * 0) - $aAgxKPHokoeshJGNDq) + $FetNiyptiqwiiSW))) * $QzFGrXKuVgcPFQV) - -172849) - $BkyEihFJBoLlc) + ((((9 - -369286) + $vcorqjBuSFOtoNbA) - $SNDYinOatvVRp))))) + $SNDYinOatvVRp))) + ((((((($OSmhCCiVVcvaoDlx + 9791) + 27379) * $HjkAVKEKmaLVbtBcFT) * (((((((-57 * $eaEMrGlxnEWQmjDHR) + -2479) * $WjSVLmvOVInmUrVgua) - $ukDbGXPMFWbsRJLfkfBGE)) * ((($isXPtwPNlizAuJTRNJSR * $HPAUgfqkInsquNcv) * $nThZRFHczodCQIjn) * $gwepfEVRJEIYqR))))) - (((((($tFbknODqZPoYEsW * (((((($uZjFCHCuwgMRmVuD - -222) * 595) + 6) * 6196) * -91707))) * 248377) * -807127) + 5)) * ((((($BDXwthxItR - 3290) * -9597) + 446413) - $WOwGSKBvgxtdHIYcrZdL) - $FawqemuyBmsawwOHZu))))) - -6)) - ((((($LEmnzzpePRBsXpSczHuel + $QUsnODxygywaKYx) - 20) * (((8 - ((((($xJgLSmCGExgpDeuwGs * -6976) - 963204) - -22) + 600))) + 35390)))) + (((($zppOCxempWOc - $HPAUgfqkInsquNcv) + ((((((794969 - $VkqtaafnKLPLPjl) * $SNDYinOatvVRp) * $isXPtwPNlizAuJTRNJSR) * -5645) - -99616))) - ((((-6042 - 5342) - 57) + 6692))) + $BpmVieflXB))) |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $ljKWwLiwvNQFdMQABBdY = ((((((-3 * -8) + ((((($DDnVDvxasyZGaH * 226308) * $pZTjfifajVwieNsXpLR) + -8900) * -115))) + -4) + 325681)) + (((((((-247 * $VkqtaafnKLPLPjl) + -44480) - $DDnVDvxasyZGaH) * ((((((((7753 + (((($WOwGSKBvgxtdHIYcrZdL + $WjSVLmvOVInmUrVgua) + 8409) * -563))) - (((((($YTANJGNkttH - $DDnVDvxasyZGaH) + $aUvphQevd) - -148665) * 499) + $isXPtwPNlizAuJTRNJSR))) - $SNDYinOatvVRp) + $ejrThZkPCAQIEm) + $AAhEbgCCcmlT)) * (((((-35676 + -7397) * -111) - $QLizooERIru) - 921) - 477117)))) + (((((((($FawqemuyBmsawwOHZu * $ukDbGXPMFWbsRJLfkfBGE) - ((((((-2222 + $FetNiyptiqwiiSW) - 7) - $KnBvQNIHSMXTUJskYJcnB) - $pZTjfifajVwieNsXpLR) + $LEcjISrNC))) + -361898) - ((((((12 - $eaEMrGlxnEWQmjDHR) - $tGRbbBukDU) + -71474) * $xJgLSmCGExgpDeuwGs) + $LEcjISrNC))) - ((((($FawqemuyBmsawwOHZu * 3) - 14458) - $ljKWwLiwvNQFdMQABBdY) + -99)))) - ((((-452 * 33019) + -923736) * $ccHRSZAjBHKVLIoy) * $WjSVLmvOVInmUrVgua))))) - ((((-2748 + 17) - $WjSVLmvOVInmUrVgua) * -719) * (((97629 * $AAhEbgCCcmlT) - $YTANJGNkttH))))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $zeQQRcnYfkaLCv = ((((((($aUvphQevd * 554) - $ukDbGXPMFWbsRJLfkfBGE) - 972) - (((((($FawqemuyBmsawwOHZu * -969940) * -75) - -97624) - -441832) * 0))) * 37)) + (($KTYbPJqBBiAcptx - -8) * 6)) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $gwepfEVRJEIYqR = ((-735 - $vcorqjBuSFOtoNbA) + ((((((-516678 + (((($QzFGrXKuVgcPFQV * $QUsnODxygywaKYx) + $WOwGSKBvgxtdHIYcrZdL) - $pZunsUehIG))) * (((-3 + $tFbknODqZPoYEsW) + -8))) + ((((($vqIPLFNhrODYOdbmYl - $YjwYiuvYpNuZt) + $FawqemuyBmsawwOHZu) + $keEoMANEKklErqkS) + $pZTjfifajVwieNsXpLR)))) + ((((($BDXwthxItR * -923) * -87) - $pZunsUehIG) * 2) * $WOwGSKBvgxtdHIYcrZdL)))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $qLjXIPrdEbvgJxTh = (((((((7 + -119401) - ((((($yycCLpGMIMmv * -27092) * $jRiEEMSDahtDXRX) - 3) * -721))) + 5788) + -6) * -7)) - (((($eaEMrGlxnEWQmjDHR - ((($miiwIudSbQSnYRd * -604356) * $gwepfEVRJEIYqR))) * -38)) - (($QzFGrXKuVgcPFQV - $FawqemuyBmsawwOHZu) - $yycCLpGMIMmv))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $xJgLSmCGExgpDeuwGs = (((((-19394 * (((((($FawqemuyBmsawwOHZu - -93808) - 81) * (((-263 - $HjkAVKEKmaLVbtBcFT) * $zeQQRcnYfkaLCv)))) - (((((52 + 4) * 939776) * 88) - $isXPtwPNlizAuJTRNJSR) * -8)))) + -752343) - $ejrThZkPCAQIEm) * $zeQQRcnYfkaLCv) - 157) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $KTYbPJqBBiAcptx = ((((($zeQQRcnYfkaLCv + ((((-6362 + $FawqemuyBmsawwOHZu) - 53) + 47))) - 2) * ((($feiJBcWxyNQPnmQF + $ukDbGXPMFWbsRJLfkfBGE) + 540)))) * ((-97 + $BhnfWCjCT) + 99949)) |
Source: svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: DisableGuestVmNetworkConnectivity |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $aAgxKPHokoeshJGNDq = ((((780456 - -477) * ((((($uZjFCHCuwgMRmVuD * $HPAUgfqkInsquNcv) + -349) * $WOwGSKBvgxtdHIYcrZdL) * -51))) + (((((($FawqemuyBmsawwOHZu * 6) * 3) - 4754) * -9) * 7))) + $HPAUgfqkInsquNcv) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $OSmhCCiVVcvaoDlx = ((((38129 + ((($VnIeYxcKsDXfxF - $feiJBcWxyNQPnmQF) - $BkyEihFJBoLlc))) - (((((7460 - $YTANJGNkttH) - $FetNiyptiqwiiSW) + $FawqemuyBmsawwOHZu) - $uZjFCHCuwgMRmVuD))) - (((($FetNiyptiqwiiSW - $BhnfWCjCT) - 8198) + $uZjFCHCuwgMRmVuD))) - (((53 - -9088) + $DDnVDvxasyZGaH))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $QUsnODxygywaKYx = (((((-33 - 23) + $BkyEihFJBoLlc) * 503) + -908) - ((($FawqemuyBmsawwOHZu - 204260) + 6143))) |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $HPAUgfqkInsquNcv = (((((-22160 + ((((($ljKWwLiwvNQFdMQABBdY * 8893) + $FawqemuyBmsawwOHZu) - -3) * 578018))) * $ejrThZkPCAQIEm) - $WOwGSKBvgxtdHIYcrZdL) - -636201) - ((((($WOwGSKBvgxtdHIYcrZdL * -25501) - -972488) * -7) * 141868))) |
Source: svchost.exe, 0000000F.00000002.2333436624.0000000003069000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWL |
Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $SZzxWNxjTVCtBKLGZMHP = ((((((($DDnVDvxasyZGaH * $tFbknODqZPoYEsW) - $aAgxKPHokoeshJGNDq) + 436) - ((((($SNDYinOatvVRp - $xAuYKQHHwEukuiZWRKEXE) * $uZjFCHCuwgMRmVuD) - ((((((-4937 - 4685) - $BDXwthxItR) * $aUvphQevd) * $AAhEbgCCcmlT) * -46))) * $aUvphQevd))) + $gsRwOcOmjjUpCXTcsHn)) * (((((18506 + (((((($TBgUhpZAusN - $tFbknODqZPoYEsW) * 40925) - 623266) * $miiwIudSbQSnYRd) + 690198))) - 86) * $lxbwosjsc) * -310927) + $FawqemuyBmsawwOHZu)) |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons Maskable |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\031db23f-f53a-4d6b-b429-cd0302ef56d3 |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\6490c938-fe3f-48ae-bc5e-e1986298f7c1 |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App Settings |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Safe Browsing Network |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons Monochrome |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\a5f61848-f128-4a80-965b-a3000feed295 |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons Monochrome |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons Monochrome |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons Maskable |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dir |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons Maskable |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\affceca8-5877-40b6-92a1-68308b316b66 |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache\index-dir |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDB |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons Maskable |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ClientCertificates |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons Monochrome |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\58ef9818-5ea1-49a0-b5b0-9338401a7943 |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons Monochrome |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons Maskable |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDB |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons Monochrome |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnWebGPUCache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\15702f96-fbc1-4934-99bf-a9a7406c1be7 |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnGraphiteCache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons Monochrome |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\discounts_db |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons Maskable |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_Data |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons Maskable |
Source: C:\Windows\System32\svchost.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb |