Source: powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmp | String found in binary or memory: file:// |
Source: powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmp | String found in binary or memory: file:/// |
Source: WINWORD.EXE, 00000001.00000002.10277396020.04500000.00000004.sdmp | String found in binary or memory: file:///C: |
Source: powershell.exe, 0000000A.00000002.10088000862.0030F000.00000004.sdmp | String found in binary or memory: file:///C:/Users/user~1/AppData/Local/Temp/ounehcnaykuL.exe |
Source: WINWORD.EXE, 00000001.00000002.10258196864.00377000.00000004.sdmp | String found in binary or memory: file:///C:/Users/user/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.IE5 |
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp | String found in binary or memory: file:///C:/Users/user/Desktop/FORMP16T.docxZ |
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp | String found in binary or memory: file:///C:/Users/user/Desktop/FORMP16T.docxl |
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp | String found in binary or memory: file:///C:/Users/user/Desktop/FORMP16T.docx~ |
Source: powershell.exe, 0000000A.00000002.10088000862.0030F000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/System32/WindowsPowerShell/v1.0/-j).l |
Source: powershell.exe, 0000000A.00000002.10088000862.0030F000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/System32/WindowsPowerShell/v1.0/;j).IN |
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Diagnostics/1.0.0.0__31bf3856ad36 |
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Management/1.0.0.0__31bf3856ad364 |
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Utility/1.0.0.0__31bf3856ad364e35 |
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.ConsoleHost/1.0.0.0__31bf3856ad364e35/Micr |
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Security/1.0.0.0__31bf3856ad364e35/Microso |
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.WSMan.Management/1.0.0.0__31bf3856ad364e35/Microsoft. |
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.Management.Automation/1.0.0.0__31bf3856ad364e35/System.M |
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp | String found in binary or memory: http:// |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crl.comodo.net/UTN-USERFirst-Hardware.crl0q |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crl.entrust.net/2048ca.crl0 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crl.entrust.net/server1.crl0 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crl.usertrust.com/UTN-USERFirst-Object.crl0) |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://crt.comodoca.com/UTNAddTrustServerCA.crt0$ |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp, ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.21.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://cybertrust.omniroot.com/repository.cfm0 |
Source: cypruscars4u.com.url.1.dr | String found in binary or memory: http://cypruscars4u.com/ |
Source: WINWORD.EXE, 00000001.00000002.10257427295.002D3000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/& |
Source: WINWORD.EXE, 00000001.00000002.10257427295.002D3000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/j |
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp, WINWORD.EXE, 00000001.00000002.10274125297.03080000.00000004.sdmp, WINWORD.EXE, 00000001.00000002.10274326524.031A0000.00000004.sdmp, WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmp, WINWORD.EXE, 00000001.00000003.10250318411.002D2000.00000004.sdmp, logo.jpg.url.1.dr | String found in binary or memory: http://cypruscars4u.com/logo.jpg |
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/logo.jpgER=E |
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/logo.jpgSSOO |
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/logo.jpgT |
Source: WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/logo.jpgTg |
Source: WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/logo.jpgUg |
Source: WINWORD.EXE, 00000001.00000002.10256887267.001FD000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/logo.jpggesktop |
Source: WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.com/logo.jpgtion.%Word |
Source: WINWORD.EXE, 00000001.00000002.10276262517.03F30000.00000004.sdmp | String found in binary or memory: http://cypruscars4u.comlogo.jpg |
Source: powershell.exe, 0000000A.00000002.10095450491.01D62000.00000004.sdmp | String found in binary or memory: http://figs4u.8 |
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp | String found in binary or memory: http://figs4u.co.uk |
Source: powershell.exe, 0000000A.00000002.10086956888.002D4000.00000004.sdmp, powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmp, powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp, powershell.exe, 0000000A.00000003.9981814778.002DD000.00000004.sdmp, task (2).bat.1.dr | String found in binary or memory: http://figs4u.co.uk/logo.bin |
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmp | String found in binary or memory: http://java.com/ |
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmp | String found in binary or memory: http://java.com/help |
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmp | String found in binary or memory: http://java.com/helphttp://java.com/help |
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmp | String found in binary or memory: http://java.com/http://java.com/ |
Source: WINWORD.EXE, 00000001.00000002.10274644205.0330D000.00000004.sdmp | String found in binary or memory: http://ns.ad |
Source: WINWORD.EXE, 00000001.00000002.10274644205.0330D000.00000004.sdmp | String found in binary or memory: http://ns.adbe. |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ocsp.comodoca.com0% |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ocsp.comodoca.com0- |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ocsp.comodoca.com0/ |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ocsp.comodoca.com05 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ocsp.entrust.net03 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://ocsp.entrust.net0D |
Source: cmd.exe, 00000008.00000002.10109548717.00433000.00000004.sdmp | String found in binary or memory: http://respons2 |
Source: powershell.exe, 0000000A.00000002.10086956888.002D4000.00000004.sdmp, powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmp, powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp, powershell.exe, 0000000A.00000003.9981814778.002DD000.00000004.sdmp, task (2).bat.1.dr | String found in binary or memory: http://responsivepixels.co.uk/logo.bin |
Source: WINWORD.EXE, 00000001.00000002.10257159625.00280000.00000004.sdmp | String found in binary or memory: http://schem |
Source: WINWORD.EXE, 00000001.00000002.10257159625.00280000.00000004.sdmp | String found in binary or memory: http://schemL? |
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp, powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmp | String found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/cimbinding/associationFilter |
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp | String found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/wsman/SelectorFilter |
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp | String found in binary or memory: http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd#IdentifyResponsep |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://www.digicert.com.my/cps.htm02 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0 |
Source: WINWORD.EXE, 00000001.00000002.10274217774.03090000.00000004.sdmp | String found in binary or memory: http://www.msnusers.com |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://www.public-trust.com/CPS/OmniRoot.html0 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://www.public-trust.com/cgi-bin/CRL/2018/cdp.crl0 |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: http://www.usertrust.com1 |
Source: ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmp | String found in binary or memory: https://82.202.221.37:447/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/injectDll32/ |
Source: ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmp | String found in binary or memory: https://82.202.221.37:447/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/injectDll32/VHK/ |
Source: ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmp | String found in binary or memory: https://82.202.221.37:447/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/systeminfo32/kE |
Source: ounehcnaykuM.exe, 00000015.00000002.10777808439.001D4000.00000004.sdmp | String found in binary or memory: https://92.55.251.211:449/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/10/62/LNOPIYJTPCBO |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: https://92.55.251.211:449/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/spk/ |
Source: ounehcnaykuM.exe, 00000015.00000002.10777944562.0022E000.00000004.sdmp, ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmp | String found in binary or memory: https://92.55.251.211:449/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/63/systeminfo/GetS |
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp | String found in binary or memory: https://secure.comodo.com/CPS0 |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 60000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: B0000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: EE2104 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10000000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10001000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10001000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10014000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10014000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10017000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10017000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 130000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: B0000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 130000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: B0000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010018 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 1001001C | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010020 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010024 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010028 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 1001002C | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010030 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010034 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010038 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 1001003C | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010040 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010044 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010048 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 1001004C | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010050 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010054 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010058 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 1001005C | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 10010060 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Memory written: C:\Windows\System32\svchost.exe base: 20000 | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE | Queries volume information: C:\Users\user~1\AppData\Local\Temp\OICE_BD2C3A33-BC6C-4098-A16D-51A8AA25C09C.0\FLEA0B.tmp VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\hh.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Diagnostics.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Diagnostics.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration.Install\2.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration.Install\2.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Management\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Management\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Runtime\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Runtime.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Runtime\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Runtime.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.ServiceProcess\2.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.ServiceProcess\2.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.DirectoryServices\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.DirectoryServices\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |