Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: C:\Windows\SysWOW64\wscript.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process where name like 'bf-p2b.exe' |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: winmgmts:\\localhost\root\securitycenter2` | memstr_619244c2-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 246587780w246587805w246587806w246587807w246587798v | memstr_10b9c0ff-b |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 246587780w246587805w246587806w246587807w246587798a | memstr_4d40c312-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 246587780w246587805w246587806w246587807w246587798p | memstr_e325349c-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: {e09d739d-ccd4-44ee-8eba-3fbf8be4fc58}c | memstr_3aea81c0-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: eh %y | memstr_8622a9be-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: errora | memstr_4fada0c5-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: eturn | memstr_e085261d-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: error y | memstr_ad8e34f2-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: crlfi~ | memstr_4dee98f2-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: errorpc~ | memstr_e5727e1b-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ;@0%y | memstr_e762c0a8-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k2wb0yw6wk | memstr_26a0261c-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\profapi.dll | memstr_cf3215ab-0 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: commonprogramfiles(x86)=c:\program files (x86)\common files | memstr_d0c018aa-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\napinsp.dll | memstr_2ea1404a-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\pnrpnsp.dll | memstr_8d3e5249-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: pathext=.com;.exe;.bat;.cmd;.vbs;.vbe;.js;.jse;.wsf;.wsh;.msc | memstr_a85a3398-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: pathext=.com;.exe;.bat;.cmd;.vbs;.vbe;.js;.jse;.wsf;.wsh;.msc] | memstr_b99a09de-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\wshbth.dllj | memstr_538147e0-0 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\userappdataq | memstr_020841dd-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k5uf7dj8xa0fn | memstr_7a127728-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\nlaapi.dll | memstr_5dfff347-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\userappdata | memstr_1e65c4fa-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\amsi.dll& | memstr_3a85d751-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trogram files\common files | memstr_0ff42cc7-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y2ck2ug8jy6e | memstr_bd060bce-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y2at9ow0n | memstr_dcf8a145-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\sspicli.dll | memstr_2d95faae-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k4kc1ih1my3t | memstr_2beb6522-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\downloads | memstr_7ae76108-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft\windows\gameexplorer | memstr_8f9f0cfb-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\public\downloads | memstr_b190e142-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h1eg5wd1gd.exe | memstr_0001f21b-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\onedrive\musicv | memstr_476a5df9-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft\windows\roamingtileso | memstr_afa62ce5-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft\windows\start menud | memstr_2134b1f2-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\music\playlists} | memstr_ef57ce36-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k9dr3ze8gxej | memstr_61733d55-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h8zd3lu4ks5wk | memstr_8e5a2d17-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\syswow64\dllhost.exe | memstr_f5f63900-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\saved games | memstr_0eafadc6-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft\windows\inetcookies< | memstr_62381900-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\recorded calls5 | memstr_a52d60c6-d |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ,c:\users\user\appdataalls" | memstr_4c2a8dc3-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\ntshrui.dll | memstr_60aeff1d-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 5go3zd | memstr_332e145c-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft\windows\start menu | memstr_acb5368d-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\public\pictures | memstr_96087ae1-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\cscapi.dll | memstr_f2d858e9-b |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\public\documents | memstr_397418cc-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\documents | memstr_97137ed2-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\3d objects | memstr_e6a2d522-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\srvcli.dll | memstr_fdba81e1-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\favorites | memstr_5673d488-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: uuinfd | memstr_7f3d7178-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: [6x:~ | memstr_3249aab2-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\nlaapi.dllk | memstr_818d85f1-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: int fd_count;uint fd_array[64] | memstr_4e3f00e3-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: [6(<~ | memstr_ca1e4e77-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\winrnr.dll' | memstr_3b7d3c7c-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y6lj8bn6eu6x | memstr_7ea1e3e1-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5kkeys | memstr_2109cbc6-0 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\wshbth.dlll | memstr_f7813246-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 246587800w246587807w246587781e | memstr_8631c159-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: function: g1ps9et3mn7d()j1hk | memstr_42d8d93b-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y9ra5bz1hh5s | memstr_389d9cfd-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h1bp2hs6jj1h | memstr_120cd3ad-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y9ra5bz1hh5s= | memstr_27e39b70-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 246587800w246587807w246587781* | memstr_ef46060d-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y5pq5nm6ai8r# | memstr_f99742d2-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 246587800w246587807w246587781 | memstr_3273d201-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $t2xx3oj8sr5n1iy4fv4rz7t = | memstr_0f4c4ed8-b |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $v1dg5qi2jv1a0iq1zs6h = | memstr_484a64ed-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y2uw9ec8l5s | memstr_25c8816a-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h1bp2hs6jj1hs | memstr_57752cb6-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h1bp2hs6jj1h5sh | memstr_171b35b3-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bcryptgetproperty $m2ls1ck8jy4a~ | memstr_74fe89b0-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bcryptsetproperty $m2ls1ck8jy4aw | memstr_2ba5c6f6-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bcryptgetproperty $m2ls1ck8jy4al | memstr_f6eebbe7-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k2bl0lg2b | memstr_6b17b431-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h1et0ty4rz7xk | memstr_77a2033d-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k3yl9mg0n | memstr_811d3916-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h4sm7yy8jh0ck | memstr_747e966f-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y2uw9ec8lk | memstr_ab97154a-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y0cm5hb1nk | memstr_d16d47c6-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ps`t8 | memstr_331bc104-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bt8st5y5ih0go3h5eo8mv3tt7j | memstr_0c206803-d |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k3gl1cq8dk | memstr_bf4812c6-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k1js5sb2wc5m | memstr_00fa2147-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h1xs2ap1c1v | memstr_500230a7-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: @s`t8st5y5ih0go3h5eo8mv3tt7j | memstr_fdf8d69a-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k0dq2ef5d | memstr_5210acbb-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k6qe5cz1v | memstr_c209db6f-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\crypt32.dll | memstr_128f04bb-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y5yv2aw9a | memstr_f87efd53-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k2yh7xc8lq4u_ | memstr_f72a3f44-d |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dword cbdata;ptr pbdata; | memstr_3c22f45e-0 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\msctf.dllm | memstr_bd458bad-d |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y6kf5xn4uo1oz | memstr_2207edd7-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k3ef4fk7ty1is | memstr_bbe84a7d-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h8wf2pd4eu5th | memstr_067404eb-0 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y5pq5nm6ai8r | memstr_fe68fb43-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k8hl0mj7kx9p | memstr_215a17ed-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k3yn2up9fk | memstr_35296f68-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\users\user\appdata\roaming2 | memstr_e523bf10-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h9qq8kn3ss5dk | memstr_43ad9763-0 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k8pl8ne7nk | memstr_46dd8ff5-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y7eg8ni2li0g | memstr_a57a0996-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k0db4wx4qk | memstr_6cc75827-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dword;dword; | memstr_2632de66-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 5go3oa | memstr_eabc3ca2-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h9oa7br0a | memstr_4b72b91a-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k6rf5yt3ja7q | memstr_277e5aea-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k8gg3ig9ai4n | memstr_aa9c6e13-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k9nw2kp4fi8c | memstr_fd239e09-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y2cp9vn5qk | memstr_6fbe3918-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k0sm8ut6if9x | memstr_d1d3183b-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k9zo4cw3m | memstr_22ecee66-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y8fu8mu6eu0j | memstr_bdb9ab69-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\cmd.exe | memstr_abcc3d9e-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y7za0ue6ls7d[ | memstr_7f4230d4-3 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: float;float;float;a | memstr_c2e06bcc-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: float;float;float;float;float;i | memstr_ad80e2d4-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h7el5fx7mb8rf | memstr_9cd8633b-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y7dj7nn6vk | memstr_e3653ebe-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y2kg6hp2zt | memstr_ba08f264-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h4gn3zk4pm | memstr_9ab7cb2a-6 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k0lv4qb3qk | memstr_bb764f90-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: float;float;float;float; | memstr_b066a178-1 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: float;float;float;float;int;k | memstr_ff11f869-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: m8pc4lh0o8ej0xo5th5k0jy3ny2mk | memstr_794bbe7c-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y5fb7pn8sy6t> | memstr_6e7c727a-d |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: e6fw8st5y5ih0go3h0wf1xa4k`< | memstr_49c87cd0-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: u9do4sd7on7r0ed7oi2y2fa4ey3yk | memstr_0496fa21-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ole2ae94be238c88f4459cc1555a5f9 | memstr_923b5c25-a |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: uu?e! | memstr_058de2a7-f |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dbu$ | memstr_386c7bbf-b |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dpe@2dt | memstr_975946d7-b |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\dnsapi.dll | memstr_205d1c95-c |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\bcrypt.dll | memstr_5b3d4ecb-8 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: c:\windows\system32\mswsock.dllu | memstr_3707cf9f-e |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: [6x^~ | memstr_13b17203-9 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ole96e6340821868812800f81c0e609! | memstr_e2082f7b-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dbul | memstr_c7bcc4f3-2 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: l/bup | memstr_1c3cd2a4-d |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 800w246587797w246587796w246587779 | memstr_a32aa82a-4 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 246587827w246587826w246587779w246587784w246587777w246587781w246587838w246587777w246587796w246587807w246587824w246587805w246587798w246587806w246587779w246587800w246587781w246587801w246587804w246587809w246587779w246587806w246587783w246587800w246587797w246587796w246587779 | memstr_d18943bf-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: erroro | memstr_335338dc-5 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: '(`n~ | memstr_5f3469af-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: >@@m~ | memstr_61f36f2e-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: error0p~ | memstr_cf2796c2-0 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: crlfo~ | memstr_6a36a2b0-7 |
Source: bf-p2b.exe, 00000000.00000002.2923860739.00000000047CF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: crlfx | memstr_2e42c3fc-c |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 0 | memstr_0e313f96-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: x*`dk | memstr_ebeb94e3-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: system | memstr_4dce5609-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: registry( | memstr_777f4187-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: smss.exeh | memstr_321568d3-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: csrss.exe( | memstr_7ebe1a4f-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: wininit.exe | memstr_368b0948-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: #r0lm | memstr_171b56e7-2 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: csrss.exe | memstr_2c4ee1f2-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: winlogon.exe | memstr_4ce37aa9-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: z3zby | memstr_a311dcd9-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: services.exe | memstr_51ba4e07-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: n`q`q`qz, | memstr_7419f775-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 73h[m | memstr_397b4899-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: lsass.exe | memstr_d6d70bf1-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exe | memstr_5a18077e-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: fontdrvhost.exe | memstr_614a84aa-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exe( | memstr_fb1b4822-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ,p#p&p#f | memstr_27f55bfc-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exe | memstr_abbbb038-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dwm.exe | memstr_356e406d-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: p, )p | memstr_e0027f89-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exeh | memstr_ad43e079-2 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: s4nrs | memstr_55a179b6-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: @[`p x | memstr_6bd14c6c-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: hh!svchost.exe( | memstr_d58d7f65-9 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: x"svchost.exe8 | memstr_6e2856b4-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: #memory compressionh | memstr_c4915553-3 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $svchost.exe | memstr_7d5aa962-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %svchost.exeh | memstr_73294557-3 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: &svchost.exe | memstr_c784906e-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 'svchost.exeh | memstr_78694576-8 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: )svchost.exe | memstr_538c98ce-8 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: *svchost.exe( | memstr_eddde137-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: +svchost.exeh | memstr_353ef393-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ,svchost.exe | memstr_71143001-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: .svchost.exe | memstr_b472471b-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: `4x+` | memstr_6f68cf50-2 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: /svchost.exe | memstr_4a9ca715-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: <(p6( | memstr_fc4262f4-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 0svchost.exe | memstr_88699a14-2 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 1svchost.exe | memstr_acac839c-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 2spoolsv.exe( | memstr_69f5ef59-3 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 3svchost.exe | memstr_46525a36-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 4svchost.exe( | memstr_19bbb1e3-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 5svchost.exe( | memstr_9d4742a8-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 6svchost.exe | memstr_20388182-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: "tx | memstr_30c80273-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 7svchost.exe | memstr_a749e92b-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: "\` | memstr_689e1f6e-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: &\t | memstr_f5e3a1fc-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 8svchost.exe( | memstr_0b2ad122-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: d~xzb | memstr_5443d8bb-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: :svchost.exe | memstr_cd38e359-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: <svchost.exe | memstr_f2f20578-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %pcnz | memstr_41c313a7-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: #=officeclicktorun.exe( | memstr_f53ee73a-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: >svchost.exeh | memstr_ee9ea5b0-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ?svchost.exeh | memstr_284f471a-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: @svchost.exe( | memstr_780c995d-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: asvchost.exe | memstr_84d0c5e3-c |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: csvchost.exe | memstr_360c7459-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dsvchost.exe( | memstr_051c979b-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: esvchost.exe | memstr_c7cc92b8-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: fsvchost.exe | memstr_43362cbd-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: k0\0]0\. | memstr_36158def-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: )gsihost.exe( | memstr_fbbc4941-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: hsvchost.exe | memstr_b46bf800-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: y0p t0px | memstr_dc3416e7-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: isvchost.exe | memstr_a8d01642-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: jsvchost.exeh | memstr_9a2e05b0-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: psvchost.exe | memstr_2cddc173-2 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: hb > ;@= ;) | memstr_44c7dfa8-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: qsvchost.exe | memstr_6c8a1f8b-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 3rctfmon.exeh | memstr_67efd83a-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ssvchost.exep | memstr_9675d552-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: s4p89 | memstr_c61525ca-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: uexplorer.exe | memstr_441ce51e-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: vsvchost.exeh | memstr_fa858e45-2 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: wdashost.exeh | memstr_cd6d5f43-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 2`1@2 | memstr_76f0a1e9-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ysvchost.exe | memstr_c03c47c3-c |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: [startmenuexperiencehost.exe | memstr_3c5fa956-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \runtimebroker.exe | memstr_1cf37b86-8 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ]searchapp.exe8 | memstr_825e5e21-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ^runtimebroker.exe | memstr_e5d7612b-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: _svchost.exe( | memstr_29de4bcd-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: `svchost.exe( | memstr_6ef7677a-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: fdllhost.exep | memstr_430533a5-8 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: )gsmartscreen.exe | memstr_0d21bd86-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: jsvchost.exe | memstr_71e2d415-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: nwmiprvse.exex | memstr_dff3ca52-c |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ah]p | memstr_163b668d-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: textinputhost.exe | memstr_980dba5d-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: audiodg.exe | memstr_67afb325-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: t"(xy | memstr_96cdc493-8 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: runtimebroker.exe | memstr_b41b1a7d-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: runtimebroker.exeh | memstr_ebe3343d-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: mousocoreworker.exe | memstr_0a713054-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: applicationframehost.exe | memstr_8f526032-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: winstore.app.exex | memstr_cd0390af-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: systemsettings.exe | memstr_73f768a5-1 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: useroobebroker.exep | memstr_3a1912cd-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 580 # q # | memstr_297ead67-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: wmiprvse.exep | memstr_31fb256e-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: #h!`h`h`h | memstr_85dbad53-4 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: sgrmbroker.exeh | memstr_21fb4e68-3 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 0$0$0$g | memstr_6294a25c-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 8:8:`-`-`- | memstr_8536f043-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dllhost.exe | memstr_4311eb96-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: joooy | memstr_96792948-9 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: cscript.exe | memstr_ae33cbe7-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: x x @d@d@d$d | memstr_25a6f7e2-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: conhost.exe | memstr_e9dbdfde-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: wmiprvse.exe | memstr_36e9f09e-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %u]$ | memstr_66eeb814-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: backgroundtaskhost.exex | memstr_1984bd1b-d |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: .p,p,p, | memstr_c417f33a-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: hgbw0 | memstr_681cb9a1-9 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: runtimebroker.exex | memstr_3e4afc7a-c |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: runtimebroker.exe( | memstr_df556b2b-8 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: upfc.exe | memstr_7459b429-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: h%h% | memstr_6455d750-2 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: hxyosdapdtxxjozxxwdxuyatksdfk.exe | memstr_3efe6327-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: pg`g8 | memstr_7b5d50cd-7 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: `gpg8 | memstr_d8a9eeab-5 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: @g0g8 | memstr_c40045a3-b |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: pg@g8 | memstr_ba5bb765-a |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 0g g8 | memstr_369d7169-e |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: hxyosdapdtxxjozxxwdxuyatksdfk.exeh | memstr_240ff688-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 9]?l; | memstr_05489571-c |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dllhost.exe( | memstr_c9c7e976-0 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bf-p2b.exe | memstr_bda7a6f3-f |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: wscript.exe | memstr_4ab4c829-6 |
Source: bf-p2b.exe, 00000000.00000003.1700527733.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: softwarefx-acrobat-reader.exe | memstr_f5e76658-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: system | memstr_6f36b9c7-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: registry( | memstr_6075cd31-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: smss.exe | memstr_cab822ed-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: csrss.exe( | memstr_4f45b024-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: wininit.exe | memstr_1b609ac0-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: #q^}1 | memstr_4d2bb20d-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: csrss.exe | memstr_c47b2ecb-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: winlogon.exe` | memstr_c37704f9-7 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: z3zby | memstr_7fb5831a-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: services.exe | memstr_2483ac0e-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: npqpqpqz,k | memstr_29922655-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: lsass.exeh | memstr_f8eb3d1f-0 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: svchost.exe | memstr_5cb71c26-b |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: fontdrvhost.exe | memstr_3e66bab4-5 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: fontdrvhost.exe | memstr_1a143905-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: lp\p\p\ | memstr_4e9d0220-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: svchost.exeh | memstr_087a1b67-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ,p#p&p#f | memstr_fd6b08c4-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dwm.exe | memstr_4ef835e0-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: p, )p | memstr_f6a299d1-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: pi.e | memstr_50ac4660-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: svchost.exex | memstr_92981b6c-5 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: svchost.exe( | memstr_688f211e-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: svchost.exe | memstr_32e41b3d-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: svchost.exe8 | memstr_60f42804-0 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: @[`px | memstr_62be097b-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: hh!svchost.exeh | memstr_86f7eec0-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: x"svchost.exe | memstr_6297d1ce-b |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: )2#memory compression | memstr_5054d4de-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $svchost.exe | memstr_a97fc1be-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %svchost.exex | memstr_ec26a230-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: &svchost.exe | memstr_204bfb31-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 'svchost.exex | memstr_257210d9-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: )svchost.exex | memstr_e9810651-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *svchost.exe | memstr_122ab4f4-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: +svchost.exe | memstr_838a1eea-5 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ,svchost.exeh | memstr_ff643998-0 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: .svchost.exe | memstr_607af0fd-7 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: `4x+` | memstr_4763f93c-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: /svchost.exe | memstr_ce61b9e0-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: <(p6( | memstr_4810f0de-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 0svchost.exe | memstr_6dcf3a63-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 1svchost.exe | memstr_2026be84-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 2spoolsv.exe | memstr_8e01fe07-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 3svchost.exe | memstr_78dae2e3-7 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 4svchost.exe( | memstr_c2f84256-7 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 5svchost.exeh | memstr_f68e1e54-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 6svchost.exe | memstr_0386ce1d-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tx | memstr_52f1a843-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 7svchost.exe | memstr_d79488fa-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \` | memstr_0be69206-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: &\t | memstr_29921aac-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 8svchost.exe | memstr_f4e8bf4b-5 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: d~xzb | memstr_0974d31b-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: :svchost.exe | memstr_8eec7f5d-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: <svchost.exe | memstr_1c526ce6-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %pcnz | memstr_151c4e89-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: #=officeclicktorun.exe( | memstr_3fc1482a-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: >svchost.exex | memstr_e0f17a5f-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ?svchost.exex | memstr_bc953dee-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: @svchost.exeh | memstr_67c941a3-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: asvchost.exe | memstr_771cd4a6-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: csvchost.exeh | memstr_d4a84da9-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dsvchost.exeh | memstr_660a4d0c-b |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: esvchost.exe | memstr_aa0b6262-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: fsvchost.exe | memstr_55418118-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: k0\0]0\. | memstr_319f0869-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: )gsihost.exe | memstr_eab757d6-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: hsvchost.exex | memstr_c6de6e50-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: y0p t0px | memstr_7e7f6876-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: isvchost.exe | memstr_3f248a45-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: jsvchost.exe | memstr_c9b1f165-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: psvchost.exex | memstr_61a768f1-7 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: hb > ;@= ;) | memstr_4dcd2ee8-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: qsvchost.exex | memstr_2ebb35b7-b |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 3rctfmon.exe | memstr_89235cf7-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ssvchost.exe | memstr_3f19db50-5 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: uexplorer.exe | memstr_7d9c655b-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vsvchost.exex | memstr_0c05a110-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: wdashost.exe | memstr_b20d6627-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 2`1@2 | memstr_1ee25b0b-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ysvchost.exex | memstr_c532f9a4-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: [startmenuexperiencehost.exe | memstr_e4b00bd7-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \runtimebroker.exe | memstr_3bffb456-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ]searchapp.exe | memstr_2148a7a3-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ^runtimebroker.exe | memstr_02c146c1-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: _svchost.exe | memstr_1f19f57f-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: `svchost.exeh | memstr_aae5f57f-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: fdllhost.exe | memstr_59b5f7f4-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: )gsmartscreen.exe | memstr_53254031-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: jsvchost.exe` | memstr_ff53ea3b-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: nwmiprvse.exe | memstr_9f06fe2d-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ah]p | memstr_4433e102-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: textinputhost.exe | memstr_674d966b-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: audiodg.exe( | memstr_34c6c887-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ch0*l | memstr_f4855d29-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: runtimebroker.exe( | memstr_b18ae941-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: runtimebroker.exe | memstr_91131264-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: mousocoreworker.exe | memstr_d0d3fccf-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: applicationframehost.exe | memstr_7c257169-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: winstore.app.exe | memstr_598d4994-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "( "o | memstr_c0b9789e-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: systemsettings.exe | memstr_1e016e55-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: useroobebroker.exe | memstr_6a7ddb21-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 580 # q # | memstr_0c1b1499-0 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: wmiprvse.exe | memstr_3e012bfb-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: #h!`h`h`h | memstr_41b20a38-0 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: sgrmbroker.exe | memstr_4ea024fd-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: svchost.exex | memstr_8767f29a-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 0$0$0$g | memstr_b1bd33df-0 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 8:8:`-`-`- | memstr_046a6ae1-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dllhost.exex | memstr_33200f7f-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: joooy | memstr_dd31fe7b-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: cscript.exe | memstr_0272e603-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: x x @d@d@d$d | memstr_05109427-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: conhost.exe | memstr_4cecc582-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: conhost.exep | memstr_7d2b4bb1-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %u]$ | memstr_7b5a6eec-7 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ,0hjo | memstr_191eb3f3-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: backgroundtaskhost.exe | memstr_5e735f23-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "(8oo | memstr_07f7f4fc-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: .p,p,p, | memstr_01fb908c-b |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: hgbw0 | memstr_9d604289-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "(pto | memstr_8cdcbfe9-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: runtimebroker.exeh | memstr_b011bd10-7 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: upfc.exe | memstr_b704365f-2 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: h%h% | memstr_bf79a658-8 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: hxyosdapdtxxjozxxwdxuyatksdfk.exe | memstr_24938337-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: pg`g8 | memstr_44e052c7-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: `gpg8 | memstr_e3c309ec-a |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: @g0g8 | memstr_4366b86c-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: pg@g8 | memstr_259e9323-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 0g g8 | memstr_a83af6ac-4 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bh8)p | memstr_64345ce6-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bh04p | memstr_bee99511-9 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bh(?p | memstr_6ec7ab04-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bhxfp | memstr_257f30ae-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bh jp | memstr_764142d0-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bhpqp | memstr_84bfffe9-c |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bhh\p | memstr_fa8880fa-6 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bh`gp | memstr_9206cfee-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bhxrp | memstr_cd3b0856-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bhp}p | memstr_f1da9bd2-1 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 9]?l; | memstr_2cb85dde-3 |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dllhost.exeh | memstr_ca9f8fbb-d |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bf-p2b.exe | memstr_8820e5a2-f |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: d555k | memstr_42afc43c-e |
Source: bf-p2b.exe, 00000000.00000003.1687690122.00000000044D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: wscript.exe | memstr_0c38454a-6 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: !this program cannot be run in dos mode. | memstr_d41000f1-e |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: hupx0 | memstr_31836bd9-a |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: upx1p | memstr_94b8e3c8-e |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: .rsrc | memstr_95c1bde9-5 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: 3.07upx! | memstr_7e56b5e5-1 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: 7upw_ | memstr_43cd58c7-5 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: 6)xh | memstr_89cb4a38-c |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: o[:=,q | memstr_be4448c6-d |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: c5,-h; | memstr_2ac59667-0 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: oplwj@ | memstr_48150392-1 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: a@pc00 | memstr_562cbeb4-f |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: f4k/dr\m | memstr_e7a4f35f-1 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: (pbu& | memstr_0970bced-f |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: :jf<q | memstr_c51a31cc-1 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: llptj | memstr_ab9b5c58-d |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: r|$t8hu | memstr_c56ebb04-e |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: 3 '(4( | memstr_aa3c0f79-9 |
Source: bf-p2b.exe, 00000000.00000000.1662738087.0000000000B00000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: ~8'p} | memstr_3bbdcbec-7 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 0 | memstr_95df8e39-6 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: x*`dk | memstr_f297313c-0 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: system | memstr_3afb54eb-d |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: registry( | memstr_899a9817-3 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: smss.exeh | memstr_ae4e96c5-e |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: csrss.exe( | memstr_eca68d52-e |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: wininit.exe | memstr_b7246914-1 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: #s0lm | memstr_69a4efef-e |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: csrss.exe | memstr_a8af9b7f-5 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: winlogon.exe | memstr_3ce73428-e |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: z3zby | memstr_8c306ad5-f |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: services.exe | memstr_fc8302fb-1 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: npqpqpqz, | memstr_454f89c3-6 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: v3h[m | memstr_53f4db0f-f |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: lsass.exe | memstr_8b63b9b6-2 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exe | memstr_32da2766-7 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: fontdrvhost.exe | memstr_679a10b4-3 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exe( | memstr_63d1be0a-8 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ,p#p&p#f | memstr_81962f7d-1 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exe | memstr_6e6b4723-6 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dwm.exe | memstr_fae55d97-1 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: p, )p | memstr_82cfc1ee-7 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: svchost.exeh | memstr_f66efe43-c |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: s4nrs | memstr_e002641e-4 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: hh!svchost.exe( | memstr_a9977917-d |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: x"svchost.exe8 | memstr_cf1e312d-f |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: #memory compressionh | memstr_91d4f0e6-8 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: $svchost.exe | memstr_ec97492e-c |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %svchost.exeh | memstr_3a90fb13-f |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: &svchost.exe | memstr_a457a02f-4 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 'svchost.exeh | memstr_42beacff-6 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: )svchost.exe | memstr_f7660d0a-a |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: *svchost.exe( | memstr_24f9ed8e-c |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: +svchost.exeh | memstr_f6df3a63-7 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ,svchost.exe | memstr_af8a2e63-3 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: .svchost.exe | memstr_c8491e52-8 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: `4x+` | memstr_f4afa748-1 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: /svchost.exe | memstr_d079219d-b |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: <(p6( | memstr_059e3ec7-2 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 0svchost.exe | memstr_3c21566f-3 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 1svchost.exe | memstr_1307db6b-e |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 2spoolsv.exe( | memstr_81440583-d |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 3svchost.exe | memstr_1b64b95c-e |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 4svchost.exe( | memstr_acb946ac-4 |
Source: bf-p2b.exe, 00000000.00000003.1710258899.0000000004F20000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 5svchost.exe( | memstr_3c3fa3aa-c |