Source: explorer.exe, 00000003.00000000.1634162143.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3031801494.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.000000000982D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: svchost.exe, 00000006.00000002.2961228667.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.1718586388.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: explorer.exe, 00000003.00000000.1634162143.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3031801494.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.000000000982D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: svchost.exe, 00000006.00000002.2961228667.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.1718586388.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: SearchApp.exe, 0000000B.00000000.1771919499.0000024B425C1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: explorer.exe, 00000003.00000000.1634162143.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3031801494.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.000000000982D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: svchost.exe, 00000006.00000002.2961228667.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.1718586388.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: explorer.exe, 00000003.00000000.1634162143.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3031801494.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.000000000982D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.2961228667.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.1718586388.0000019E29FBD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: SearchApp.exe, 0000000B.00000000.1771919499.0000024B425C1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: explorer.exe, 00000003.00000002.2985052008.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.00000000078AD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di |
Source: SearchApp.exe, 0000000B.00000000.1755006893.000002433B7BB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: explorer.exe, 00000003.00000002.3045067363.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1635099926.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.3023688229.0000000008720000.00000002.00000001.00040000.00000000.sdmp, RuntimeBroker.exe, 0000000A.00000002.2963352033.000001ECFC470000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: svchost.exe, 00000005.00000002.2919603174.00000151A4A65000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715089541.00000151A4A65000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 00000005.00000002.2919603174.00000151A4A65000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715089541.00000151A4A65000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 00000005.00000000.1715061141.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.com |
Source: explorer.exe, 00000003.00000000.1638855988.000000000C893000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3059382822.000000000C893000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe |
Source: svchost.exe, 00000005.00000000.1715061141.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.comt |
Source: SearchApp.exe, 0000000B.00000000.1771194064.0000024B423E8000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1755590053.0000024340029000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: SearchApp.exe, 0000000B.00000000.1767315960.0000024B41F45000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: SearchApp.exe, 0000000B.00000000.1767315960.0000024B41F45000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb |
Source: explorer.exe, 00000003.00000000.1634162143.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/Vh5j3k |
Source: explorer.exe, 00000003.00000000.1634162143.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/odirmr |
Source: explorer.exe, 00000003.00000000.1638855988.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3059382822.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://android.notify.windows.com/iOS |
Source: explorer.exe, 00000003.00000002.3031801494.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.00000000097D4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/ |
Source: explorer.exe, 00000003.00000002.3031801494.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.00000000097D4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/q |
Source: explorer.exe, 00000003.00000002.2944847017.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1632391026.0000000001240000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1633247183.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2905026359.0000000001240000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: explorer.exe, 00000003.00000002.3031801494.00000000096DF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.00000000096DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?& |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc |
Source: explorer.exe, 00000003.00000002.3031801494.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows? |
Source: explorer.exe, 00000003.00000002.3031801494.00000000096DF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.00000000096DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://arc.msn.comi |
Source: svchost.exe, 00000005.00000000.1715119977.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715061141.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2921088315.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.activity.windows.com |
Source: svchost.exe, 00000005.00000000.1715061141.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.activity.windows.com/v1/assets |
Source: svchost.exe, 00000005.00000000.1715061141.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.activity.windows.com/v1/assets/$batch |
Source: svchost.exe, 00000005.00000000.1715119977.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2921088315.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.activity.windows.comer |
Source: svchost.exe, 00000005.00000000.1715061141.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.activity.windows.coms |
Source: explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg |
Source: explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings |
Source: explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg |
Source: svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://bn2-df.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000006.00000000.1718218734.0000019E297F1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.2947061368.0000019E297F1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.onenote.net/livetile/?Language=en-GB |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark |
Source: explorer.exe, 00000003.00000002.2985052008.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.00000000078AD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu |
Source: explorer.exe, 00000003.00000002.2985052008.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.00000000078AD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark |
Source: explorer.exe, 00000003.00000000.1638855988.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3059382822.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.com |
Source: StartMenuExperienceHost.exe, 00000009.00000002.2905023866.000001B98144E000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000009.00000000.1728659205.000001B98144E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.comcp |
Source: SearchApp.exe, 0000000B.00000000.1808464287.0000024B44916000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://fb.me/react-polyfills |
Source: SearchApp.exe, 0000000B.00000000.1808464287.0000024B44916000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://fb.me/react-polyfillsThis |
Source: SearchApp.exe, 0000000B.00000000.1769491887.0000024B42180000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://gcc.loki.delve.office.com/api |
Source: SearchApp.exe, 0000000B.00000000.1769491887.0000024B42180000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://gcchigh.loki.office365.us/api/ |
Source: svchost.exe, 00000005.00000002.2917556566.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://global.notify.windows.com/v2/register/xplatform/device |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img |
Source: explorer.exe, 00000003.00000002.2985052008.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.00000000078AD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img |
Source: svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/ |
Source: svchost.exe, 00000005.00000000.1715119977.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2921088315.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.local |
Source: svchost.exe, 00000005.00000000.1715119977.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2921088315.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.local/ |
Source: svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1771563723.0000024B4248E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net |
Source: svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/ |
Source: SearchApp.exe, 0000000B.00000000.1769589682.0000024B4218C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://loki.delve.office.com/api |
Source: SearchApp.exe, 0000000B.00000000.1769589682.0000024B4218C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://msit.loki.delve.office.com/apiQ |
Source: StartMenuExperienceHost.exe, 00000009.00000002.2911384205.000001B9814D0000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000009.00000000.1728745445.000001B9814D0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.com |
Source: explorer.exe, 00000003.00000000.1638855988.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3059382822.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.com_ |
Source: SearchApp.exe, 0000000B.00000000.1805286472.0000024B447CF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.office.com/M365.Access |
Source: SearchApp.exe, 0000000B.00000000.1763641682.0000024B41B40000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.office.com/User.ReadWriteK |
Source: SearchApp.exe, 0000000B.00000000.1829269370.0000024B55259000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.office365.com/mail/deeplink/attachment/ |
Source: explorer.exe, 00000003.00000000.1638855988.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3059382822.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comcember |
Source: StartMenuExperienceHost.exe, 00000009.00000002.2905023866.000001B98144E000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000009.00000000.1728659205.000001B98144E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comxee |
Source: SearchApp.exe, 0000000B.00000000.1766436902.0000024B41E30000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://searchapp.bundleassets.example/desktop/2.html |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/ |
Source: SearchApp.exe, 0000000B.00000000.1763641682.0000024B41B40000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://substrate.office.com/M365.Access |
Source: SearchApp.exe, 0000000B.00000000.1829269370.0000024B55259000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://substrate.office.com/SubstrateSearch-Internal.ReadWriteO |
Source: SearchApp.exe, 0000000B.00000000.1829269370.0000024B55259000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://substrate.office.com/search/api/v1/events?scenario= |
Source: smartscreen.exe, 00000010.00000002.2966541027.000001A22A337000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://unitedstates1.ss.wd.microsoft.us |
Source: smartscreen.exe, 00000010.00000002.2966541027.000001A22A337000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://unitedstates2.ss.wd.microsoft.us |
Source: smartscreen.exe, 00000010.00000002.2966541027.000001A22A337000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://unitedstates4.ss.wd.microsoft.us |
Source: SearchApp.exe, 0000000B.00000000.1752124326.0000024339C00000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.cn/shellRESP |
Source: SearchApp.exe, 0000000B.00000000.1752124326.0000024339C00000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com/shell |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000003.00000002.3059382822.000000000C557000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1638855988.000000000C557000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://wns.windows.com/L |
Source: explorer.exe, 00000003.00000000.1638855988.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3059382822.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000009.00000002.2905023866.000001B98144E000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000009.00000000.1728659205.000001B98144E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.com |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1 |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi |
Source: explorer.exe, 00000003.00000002.2985052008.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re- |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow- |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar |
Source: explorer.exe, 00000003.00000000.1634162143.00000000078AD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win |
Source: SearchApp.exe, 0000000B.00000000.1829269370.0000024B55240000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1797450893.0000024B44184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/finance?OCID=WSB_TL_FN&PC=wsbmsnqs |
Source: SearchApp.exe, 0000000B.00000000.1797450893.0000024B44184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/news?OCID=WSB_QS_NE&PC=wsbmsnqs |
Source: SearchApp.exe, 0000000B.00000000.1829269370.0000024B55240000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/news?OCID=WSB_QS_NE&PC=wsbmsnqshttps://www.msn.com/sports?OCID=WSB_TL_EL&PC=wsbm |
Source: SearchApp.exe, 0000000B.00000000.1797450893.0000024B44184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/sports?OCID=WSB_TL_EL&PC=wsbmsnqs |
Source: SearchApp.exe, 0000000B.00000000.1829269370.0000024B55240000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1797450893.0000024B44184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/weather?OCID=WSB_QS_WE&PC=wsbmsnqs |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com:443/en-us/feed |
Source: SearchApp.exe, 0000000B.00000000.1771563723.0000024B4248E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.ng.com |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/ |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007900000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe |
Source: svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1771563723.0000024B4248E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xsts.auth.xboxlive.com |
Source: svchost.exe, 00000005.00000002.2922265482.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xsts.auth.xboxlive.com/ |
Source: C:\Users\user\Desktop\java.exe | Code function: 0_2_02230005 | 0_2_02230005 |
Source: C:\Users\user\Desktop\java.exe | Code function: 0_2_02231845 | 0_2_02231845 |
Source: C:\Users\user\Desktop\java.exe | Code function: 0_2_02230EA9 | 0_2_02230EA9 |
Source: C:\Windows\SysWOW64\winver.exe | Code function: 2_2_03391821 | 2_2_03391821 |
Source: C:\Windows\SysWOW64\winver.exe | Code function: 2_2_03390E85 | 2_2_03390E85 |
Source: C:\Windows\explorer.exe | Code function: 3_2_01341821 | 3_2_01341821 |
Source: C:\Windows\explorer.exe | Code function: 3_2_01340E85 | 3_2_01340E85 |
Source: C:\Windows\explorer.exe | Code function: 3_2_01371821 | 3_2_01371821 |
Source: C:\Windows\explorer.exe | Code function: 3_2_01370E85 | 3_2_01370E85 |
Source: C:\Windows\System32\sihost.exe | Code function: 4_2_00AC0E85 | 4_2_00AC0E85 |
Source: C:\Windows\System32\sihost.exe | Code function: 4_2_00AC1821 | 4_2_00AC1821 |
Source: C:\Windows\System32\svchost.exe | Code function: 5_2_00910E85 | 5_2_00910E85 |
Source: C:\Windows\System32\svchost.exe | Code function: 5_2_00911821 | 5_2_00911821 |
Source: C:\Windows\System32\svchost.exe | Code function: 6_2_009A0E85 | 6_2_009A0E85 |
Source: C:\Windows\System32\svchost.exe | Code function: 6_2_009A1821 | 6_2_009A1821 |
Source: C:\Windows\System32\ctfmon.exe | Code function: 7_2_00A50E85 | 7_2_00A50E85 |
Source: C:\Windows\System32\ctfmon.exe | Code function: 7_2_00A51821 | 7_2_00A51821 |
Source: C:\Windows\System32\svchost.exe | Code function: 8_2_00D40E85 | 8_2_00D40E85 |
Source: C:\Windows\System32\svchost.exe | Code function: 8_2_00D41821 | 8_2_00D41821 |
Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | Code function: 9_2_00B50E85 | 9_2_00B50E85 |
Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | Code function: 9_2_00B51821 | 9_2_00B51821 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 10_2_00111821 | 10_2_00111821 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 10_2_00110E85 | 10_2_00110E85 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 13_2_001C1821 | 13_2_001C1821 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 13_2_001C0E85 | 13_2_001C0E85 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 13_2_02300005 | 13_2_02300005 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 13_2_02300EA9 | 13_2_02300EA9 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 15_2_00AB0E85 | 15_2_00AB0E85 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 15_2_00AB1821 | 15_2_00AB1821 |
Source: C:\Windows\System32\smartscreen.exe | Code function: 16_2_00291821 | 16_2_00291821 |
Source: C:\Windows\System32\smartscreen.exe | Code function: 16_2_00290E85 | 16_2_00290E85 |
Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe | Code function: 19_2_00581821 | 19_2_00581821 |
Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe | Code function: 19_2_00580E85 | 19_2_00580E85 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 20_2_001C1821 | 20_2_001C1821 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 20_2_001C0E85 | 20_2_001C0E85 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 20_2_022A0005 | 20_2_022A0005 |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 20_2_022A0EA9 | 20_2_022A0EA9 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 22_2_003D1821 | 22_2_003D1821 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 22_2_003D0E85 | 22_2_003D0E85 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 23_2_00900E85 | 23_2_00900E85 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 23_2_00901821 | 23_2_00901821 |
Source: C:\Windows\System32\ApplicationFrameHost.exe | Code function: 24_2_00181821 | 24_2_00181821 |
Source: C:\Windows\System32\ApplicationFrameHost.exe | Code function: 24_2_00180E85 | 24_2_00180E85 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 26_2_00191821 | 26_2_00191821 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 26_2_00190E85 | 26_2_00190E85 |
Source: C:\Windows\System32\oobe\UserOOBEBroker.exe | Code function: 28_2_00011821 | 28_2_00011821 |
Source: C:\Windows\System32\oobe\UserOOBEBroker.exe | Code function: 28_2_00010E85 | 28_2_00010E85 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000D1821 | 29_2_000D1821 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000D0E85 | 29_2_000D0E85 |
Source: C:\Windows\System32\dllhost.exe | Code function: 30_2_00261821 | 30_2_00261821 |
Source: C:\Windows\System32\dllhost.exe | Code function: 30_2_00260E85 | 30_2_00260E85 |
Source: C:\Windows\SysWOW64\cscript.exe | Code function: 31_2_04D80E85 | 31_2_04D80E85 |
Source: C:\Windows\SysWOW64\cscript.exe | Code function: 31_2_04D81821 | 31_2_04D81821 |
Source: C:\Windows\System32\conhost.exe | Code function: 32_2_00880E85 | 32_2_00880E85 |
Source: C:\Windows\System32\conhost.exe | Code function: 32_2_00881821 | 32_2_00881821 |
Source: C:\Windows\System32\conhost.exe | Code function: 33_2_00900E85 | 33_2_00900E85 |
Source: C:\Windows\System32\conhost.exe | Code function: 33_2_00901821 | 33_2_00901821 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 35_2_00890E85 | 35_2_00890E85 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 35_2_00891821 | 35_2_00891821 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 36_2_00031821 | 36_2_00031821 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 36_2_00030E85 | 36_2_00030E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 37_2_01531821 | 37_2_01531821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 37_2_01530E85 | 37_2_01530E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 38_2_02771821 | 38_2_02771821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 38_2_02770E85 | 38_2_02770E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 39_2_00B80E85 | 39_2_00B80E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 39_2_00B81821 | 39_2_00B81821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 40_2_008B0E85 | 40_2_008B0E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 40_2_008B1821 | 40_2_008B1821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 41_2_00B50E85 | 41_2_00B50E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 41_2_00B51821 | 41_2_00B51821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 42_2_02EB0E85 | 42_2_02EB0E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 42_2_02EB1821 | 42_2_02EB1821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 43_2_02D10E85 | 43_2_02D10E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 43_2_02D11821 | 43_2_02D11821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 44_2_02B40E85 | 44_2_02B40E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 44_2_02B41821 | 44_2_02B41821 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 45_2_02E20E85 | 45_2_02E20E85 |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 45_2_02E21821 | 45_2_02E21821 |
Source: C:\Windows\System32\conhost.exe | Code function: String function: 00883653 appears 35 times | |
Source: C:\Windows\System32\conhost.exe | Code function: String function: 00903653 appears 35 times | |
Source: C:\Windows\SysWOW64\winver.exe | Code function: String function: 03393653 appears 35 times | |
Source: C:\Windows\System32\svchost.exe | Code function: String function: 00913653 appears 35 times | |
Source: C:\Windows\System32\svchost.exe | Code function: String function: 009A3653 appears 35 times | |
Source: C:\Windows\System32\svchost.exe | Code function: String function: 00D43653 appears 35 times | |
Source: C:\Windows\System32\svchost.exe | Code function: String function: 000D3653 appears 35 times | |
Source: C:\Windows\System32\ctfmon.exe | Code function: String function: 00A53653 appears 35 times | |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: String function: 02303677 appears 34 times | |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: String function: 001C3653 appears 70 times | |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: String function: 022A3677 appears 34 times | |
Source: C:\Windows\explorer.exe | Code function: String function: 01373653 appears 35 times | |
Source: C:\Windows\explorer.exe | Code function: String function: 01343653 appears 34 times | |
Source: C:\Windows\System32\ApplicationFrameHost.exe | Code function: String function: 00183653 appears 35 times | |
Source: C:\Windows\System32\oobe\UserOOBEBroker.exe | Code function: String function: 00013653 appears 35 times | |
Source: C:\Windows\System32\smartscreen.exe | Code function: String function: 00293653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 00B83653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 02EB3653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 01533653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 02D13653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 008B3653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 02E23653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 02B43653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 02773653 appears 35 times | |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: String function: 00B53653 appears 35 times | |
Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | Code function: String function: 00B53653 appears 35 times | |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: String function: 00193653 appears 35 times | |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: String function: 003D3653 appears 35 times | |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: String function: 00113653 appears 35 times | |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: String function: 00903653 appears 35 times | |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: String function: 00AB3653 appears 35 times | |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: String function: 00893653 appears 35 times | |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: String function: 00033653 appears 35 times | |
Source: C:\Windows\System32\sihost.exe | Code function: String function: 00AC3653 appears 35 times | |
Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe | Code function: String function: 00583653 appears 35 times | |
Source: C:\Windows\SysWOW64\cscript.exe | Code function: String function: 04D83653 appears 35 times | |
Source: C:\Windows\System32\dllhost.exe | Code function: String function: 00263653 appears 35 times | |
Source: C:\Users\user\Desktop\java.exe | Code function: String function: 02233677 appears 34 times | |
Source: svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;I! |
Source: explorer.exe, 00000003.00000002.3031801494.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3031801494.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1636199688.000000000982D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.1718266506.0000019E29F00000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.2948940372.0000019E29F00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: SearchApp.exe, 0000000B.00000003.1882108297.0000024B5A153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Microsoft.Office.Excel_8wekyb3d8bbwe!microsoft.excel{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\RemotePC\RPCSuite.exeAirWatchLLC.VMwareWorkspaceONE_htcwkw4rx2gx4!App11496{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Vector Magic\vmde.exe{6D809377-6AF0-444B-8957-A3773F02200E}\vJoy\x64\vJoyConf.exe{6D809377-6AF0-444B-8957-A3773F02200E}\YoloMouse\YoloMouse.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\ExitLag\ExitLag.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Jitsi\Jitsi.exeMAGIX.MusicMakerJam_a2t3txkz9j1jw!MAGIX.MusicMakerJam.App11626{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\ASUS\Splendid\ACVT.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Pritunl\pritunl.exeMicrosoft.HoganThreshold_8wekyb3d8bbwe!xgame.App |
Source: explorer.exe, 00000003.00000000.1637129940.0000000009977000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000 |
Source: SearchApp.exe, 0000000B.00000000.1797450893.0000024B44184000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1767315960.0000024B41F45000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1780931087.0000024B42D43000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: var fbpkgiid = fbpkgiid || {}; fbpkgiid.page = '';;(function(BingAtWork) { if (typeof (bfbWsbTel) !== "undefined") { BingAtWork.WsbWebTelemetry.init({"cfg":{"e":true,"env":"PROD","t":"33d70a864599496b982a39f036f71122-2064703e-3a9d-4d90-8362-eec08dffe8e8-7176"},"ig":"892FA07886414BDF8EE1764A59FF39C6","ConversationId":"21139c92-d559-45ad-9d8f-73e2a64bf7e7","LogicalId":"30363daf-0e99-4b56-afae-f0c5eee8522a","tid":"651d53d035ec4c7eba14a4092e8aedb0","sid":"193A581F83766B4319784BBF829B6A16","uid":"","muid":"6666694284484FA1B35CCB433D42E997","puid":null,"isMtr":false,"tn":null,"tnid":null,"msa":false,"mkt":"en-us","b":"edge","eref":"Ref A: 651d53d035ec4c7eba14a4092e8aedb0 Ref B: MWHEEEAP0024F6D Ref C: 2023-10-04T12:00:16Z","vs":{"BAW12":"BFBBCEJIT2","BAW2":"BFBSPRC","BAW5":"PREMSBCUSTVERT","BAW7":"BFBPROWSBINITCF","CLIENT":"WINDOWS","COLUMN":"SINGLE","FEATURE.BFBBCEJIT":"1","FEATURE.BFBBCEJIT2":"1","FEATURE.BFBEDUQWQSCLKWSB":"1","FEATURE.BFBPROWSBINITCF":"1","FEATURE.BFBREFRPLAN":"1","FEATURE.BFBSPRC":"1","FEATURE.BFBWSBRS0830TF":"1","FEATURE.MSAAUTOJOIN":"1","FEATURE.MSBDSBIGLEAM":"1","FEATURE.MSBDSBORGV2":"1","FEATURE.MSBDSBORGV2CO":"1","FEATURE.MSBWDSBI920T1":"1","FEATURE.MSNSBT1":"1","FEATURE.WSBREF-T":"1","MKT":"EN-US","MS":"0","NEWHEADER":"1","THEME":"THBRAND","UILANG":"EN"},"dev":"DESKTOP","os":"WINDOWS","osver":"11","dc":"CoreUX-Prod-MWHE01","canvas":"","sci":true,"isMidgardEnabled":true,"isHomepage":false,"snrVersion":"2023.10.03.39942242"}); } })(BingAtWork || (BingAtWork = {}));;_w.rms.js({'A:rms:answers:BoxModel:Framework':'https:\/\/r.bing.com\/rb\/18\/jnc,nj\/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w'});; |
Source: SearchApp.exe, 0000000B.00000000.1781018037.0000024B42D64000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware.View.Client |
Source: winver.exe, 00000002.00000002.2893076976.0000000003287000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}} |
Source: explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}' |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware horizon client*|vm ware8394 |
Source: explorer.exe, 00000003.00000000.1637129940.0000000009977000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware SATA CD00 |
Source: explorer.exe, 00000003.00000000.1634162143.00000000078AD000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NXTTAVMWare |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: net\5.1.0*|vmware workstation 12 player*|vmpl5459 |
Source: SearchApp.exe, 0000000B.00000000.1781018037.0000024B42D64000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware.View.Client12451 |
Source: explorer.exe, 00000003.00000002.3031801494.0000000009815000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000 |
Source: SearchApp.exe, 0000000B.00000003.1883649123.0000024B5CBD7000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware horizon client*|vmare7220\nero.exe |
Source: explorer.exe, 00000003.00000002.2985052008.0000000007A34000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1634162143.0000000007A34000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWen-GBnx |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware workstation 12 player*|vmpl5459 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|*|vmware6886 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A54E000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|hyper-v manager*|vm4595 |
Source: SearchApp.exe, 0000000B.00000003.1804124700.0000024B44464000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: |*|qemu10642 |
Source: explorer.exe, 00000003.00000000.1636199688.0000000009660000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er |
Source: SearchApp.exe, 0000000B.00000000.1855361847.0000024B55CC4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware.Horizon.Client |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware horizon client*|vmare7220 |
Source: RuntimeBroker.exe, 0000000A.00000002.2923038092.000001ECFA2A4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000003.00000000.1637129940.00000000098A8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware workstation 15 player*|vmplayer6438 |
Source: explorer.exe, 00000003.00000002.2905026359.0000000001240000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000} |
Source: explorer.exe, 00000003.00000002.2985052008.00000000079FB000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: !!!!!!!MKKSkSe*|vmware vsphere client*|vspe6388 |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: E}\MediaHuman\A*|vmware horizon client*|vdi3894 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A54E000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|*|qemu10642 |
Source: SearchApp.exe, 0000000B.00000000.1771919499.0000024B425C1000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1759250182.00000243411CA000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w |
Source: svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;nlse] |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A54E000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|hyper-v manager*|hyperv4178 |
Source: SearchApp.exe, 0000000B.00000000.1855361847.0000024B55CC4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware.Workstation.vmui |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A54E000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|hyper-v manager*|virtual5441 |
Source: explorer.exe, 00000003.00000000.1640106442.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}r.exe |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: {7C5A4*|vmware vsphere client*|vcenter5038 |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: F-A0FB-4BFC-874*|vmware horizon client*|vmare7220 |
Source: explorer.exe, 00000003.00000000.1640106442.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\ |
Source: svchost.exe, 00000005.00000000.1715119977.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2921088315.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000000.1754943527.000002433B786000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: SearchApp.exe, 0000000B.00000003.1882108297.0000024B5A153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: AirWatchLLC.VMwareWorkspaceONE_htcwkw4rx2gx4!App |
Source: SearchApp.exe, 0000000B.00000003.1882108297.0000024B5A153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: {6D809377-6AF0-444B-8957-A3773F02200E}\Hyper-V\VMCreate.exe |
Source: explorer.exe, 00000003.00000002.2985052008.00000000078A0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$ |
Source: explorer.exe, 00000003.00000002.3031801494.0000000009815000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NECVMWar VMware SATA CD00\w |
Source: explorer.exe, 00000003.00000000.1637129940.00000000098A8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000 |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: l 2017\Petrel*|vmware horizon client*|vm ware8394 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware vsphere client*|vspe6388 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware horizon client*|vdi3894 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A54E000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|hyper-v manager*|hyper v4919 |
Source: SearchApp.exe, 0000000B.00000000.1855361847.0000024B55CC4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware.Workstation.vmui218 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware horizon client*|view5503 |
Source: svchost.exe, 00000005.00000000.1715147840.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1; |
Source: SearchApp.exe, 0000000B.00000003.1882108297.0000024B5A153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Meld\Meld.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Sparx Systems\EA\EA.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\MakeMKV\makemkv.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\MirrorOp\MirrorOp.exeC:\Games\Counter-Strike WaRzOnE\CS16Launcher.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\PDFBinder\PDFBinder.exe{6D809377-6AF0-444B-8957-A3773F02200E}\PureRef\PureRef.exeA97ECD55.KYOCERAPrintCenter_kqmhh0ktdt7dg!KYOCERAPrintCenter{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Meitu\XiuXiu\XiuXiu.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Zoiper5\Zoiper5.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\MP3Gain\MP3GainGUI.exe{6D809377-6AF0-444B-8957-A3773F02200E}\Hyper-V\VMCreate.exeLenovoCorporation.LenovoSettings_4642shxvsv8s2!App10978 |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Enterprise\Co*|vmware horizon client*|view5503 |
Source: SearchApp.exe, 0000000B.00000003.1815167421.0000024B5A502000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware vsphere client*|vcenter5038 |
Source: SearchApp.exe, 0000000B.00000003.1883649123.0000024B5CBD7000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: *|vmware vsphere client*|vspe6388-4BFC-874A |
Source: explorer.exe, 00000003.00000002.2905026359.0000000001240000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: SearchApp.exe, 0000000B.00000003.1812545124.0000024B5CBD6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 377*|vmware workstation 15 player*|vmplayer6438 |
Source: C:\Users\user\Desktop\java.exe | Code function: 0_2_00401000 mov eax, dword ptr fs:[00000030h] | 0_2_00401000 |
Source: C:\Users\user\Desktop\java.exe | Code function: 0_2_02230C63 mov eax, dword ptr fs:[00000030h] | 0_2_02230C63 |
Source: C:\Windows\SysWOW64\winver.exe | Code function: 2_2_03390C3F mov eax, dword ptr fs:[00000030h] | 2_2_03390C3F |
Source: C:\Windows\explorer.exe | Code function: 3_2_01340C3F mov eax, dword ptr fs:[00000030h] | 3_2_01340C3F |
Source: C:\Windows\explorer.exe | Code function: 3_2_01370C3F mov eax, dword ptr fs:[00000030h] | 3_2_01370C3F |
Source: C:\Windows\System32\sihost.exe | Code function: 4_2_00AC0C3F mov eax, dword ptr fs:[00000030h] | 4_2_00AC0C3F |
Source: C:\Windows\System32\svchost.exe | Code function: 5_2_00910C3F mov eax, dword ptr fs:[00000030h] | 5_2_00910C3F |
Source: C:\Windows\System32\svchost.exe | Code function: 6_2_009A0C3F mov eax, dword ptr fs:[00000030h] | 6_2_009A0C3F |
Source: C:\Windows\System32\ctfmon.exe | Code function: 7_2_00A50C3F mov eax, dword ptr fs:[00000030h] | 7_2_00A50C3F |
Source: C:\Windows\System32\svchost.exe | Code function: 8_2_00D40C3F mov eax, dword ptr fs:[00000030h] | 8_2_00D40C3F |
Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | Code function: 9_2_00B50C3F mov eax, dword ptr fs:[00000030h] | 9_2_00B50C3F |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 10_2_00110C3F mov eax, dword ptr fs:[00000030h] | 10_2_00110C3F |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 13_2_001C0C3F mov eax, dword ptr fs:[00000030h] | 13_2_001C0C3F |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 13_2_02300C63 mov eax, dword ptr fs:[00000030h] | 13_2_02300C63 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 15_2_00AB0C3F mov eax, dword ptr fs:[00000030h] | 15_2_00AB0C3F |
Source: C:\Windows\System32\smartscreen.exe | Code function: 16_2_00290C3F mov eax, dword ptr fs:[00000030h] | 16_2_00290C3F |
Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe | Code function: 19_2_00580C3F mov eax, dword ptr fs:[00000030h] | 19_2_00580C3F |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 20_2_001C0C3F mov eax, dword ptr fs:[00000030h] | 20_2_001C0C3F |
Source: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe | Code function: 20_2_022A0C63 mov eax, dword ptr fs:[00000030h] | 20_2_022A0C63 |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 22_2_003D0C3F mov eax, dword ptr fs:[00000030h] | 22_2_003D0C3F |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 23_2_00900C3F mov eax, dword ptr fs:[00000030h] | 23_2_00900C3F |
Source: C:\Windows\System32\ApplicationFrameHost.exe | Code function: 24_2_00180C3F mov eax, dword ptr fs:[00000030h] | 24_2_00180C3F |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 26_2_00190C3F mov eax, dword ptr fs:[00000030h] | 26_2_00190C3F |
Source: C:\Windows\System32\oobe\UserOOBEBroker.exe | Code function: 28_2_00010C3F mov eax, dword ptr fs:[00000030h] | 28_2_00010C3F |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000D0C3F mov eax, dword ptr fs:[00000030h] | 29_2_000D0C3F |
Source: C:\Windows\System32\dllhost.exe | Code function: 30_2_00260C3F mov eax, dword ptr fs:[00000030h] | 30_2_00260C3F |
Source: C:\Windows\SysWOW64\cscript.exe | Code function: 31_2_04D80C3F mov eax, dword ptr fs:[00000030h] | 31_2_04D80C3F |
Source: C:\Windows\System32\conhost.exe | Code function: 32_2_00880C3F mov eax, dword ptr fs:[00000030h] | 32_2_00880C3F |
Source: C:\Windows\System32\conhost.exe | Code function: 33_2_00900C3F mov eax, dword ptr fs:[00000030h] | 33_2_00900C3F |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 35_2_00890C3F mov eax, dword ptr fs:[00000030h] | 35_2_00890C3F |
Source: C:\Windows\System32\RuntimeBroker.exe | Code function: 36_2_00030C3F mov eax, dword ptr fs:[00000030h] | 36_2_00030C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 37_2_01530C3F mov eax, dword ptr fs:[00000030h] | 37_2_01530C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 38_2_02770C3F mov eax, dword ptr fs:[00000030h] | 38_2_02770C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 39_2_00B80C3F mov eax, dword ptr fs:[00000030h] | 39_2_00B80C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 40_2_008B0C3F mov eax, dword ptr fs:[00000030h] | 40_2_008B0C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 41_2_00B50C3F mov eax, dword ptr fs:[00000030h] | 41_2_00B50C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 42_2_02EB0C3F mov eax, dword ptr fs:[00000030h] | 42_2_02EB0C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 43_2_02D10C3F mov eax, dword ptr fs:[00000030h] | 43_2_02D10C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 44_2_02B40C3F mov eax, dword ptr fs:[00000030h] | 44_2_02B40C3F |
Source: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe | Code function: 45_2_02E20C3F mov eax, dword ptr fs:[00000030h] | 45_2_02E20C3F |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\explorer.exe base: 1340000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\sihost.exe base: AC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 910000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 9A0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\ctfmon.exe base: A50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\explorer.exe base: 1370000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\svchost.exe base: D40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 110000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: A90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: AB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\smartscreen.exe base: 290000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 580000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 3D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 900000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 180000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A10000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 190000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F10000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 10000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\svchost.exe base: D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 260000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\SysWOW64\cscript.exe base: 4D80000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 880000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 900000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\backgroundTaskHost.exe base: C50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 890000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1530000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2770000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B80000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 8B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2EB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2D10000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2B40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2E20000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: BE0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2CA0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: C40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1120000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2F40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2F60000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 3070000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 14D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B70000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1610000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2C90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: CC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 660000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 14B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1010000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: D90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F10000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 6E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 930000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2360000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 970000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1050000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 7B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1020000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 9C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 850000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AA0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: CE0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F70000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 20E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 680000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2870000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2CC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 5A0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2C60000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 12F0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2280000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: A50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1A0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: A50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 600000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1040000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2C90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1240000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AE0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2380000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B80000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 7F0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2DD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2F30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1200000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2CE0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 28C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1220000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 900000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F10000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 28F0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2820000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F20000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: BE0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2D80000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: E30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: A60000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 29B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 540000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B70000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: EE0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory allocated: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 740000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\explorer.exe EIP: 13408B3 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\sihost.exe EIP: AC090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 91090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 9A090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\ctfmon.exe EIP: A5090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\explorer.exe EIP: 137090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\svchost.exe EIP: D4090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe EIP: B5090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: 11090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe EIP: A9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: AB090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\smartscreen.exe EIP: 29090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe EIP: 58090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: 3D090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: 90090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\ApplicationFrameHost.exe EIP: 18090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe EIP: A1090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: 19090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\ImmersiveControlPanel\SystemSettings.exe EIP: F1090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\oobe\UserOOBEBroker.exe EIP: 1090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\svchost.exe EIP: D090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\dllhost.exe EIP: 26090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\SysWOW64\cscript.exe EIP: 4D8090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\conhost.exe EIP: 88090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\conhost.exe EIP: 90090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\backgroundTaskHost.exe EIP: C5090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: 89090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: 3090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: 153090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: 277090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: B8090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: 8B090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: B5090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: 2EB090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: 2D1090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: 2B4090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe EIP: 2E2090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: BE090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2CA090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: C4090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 112090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2F4090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: F9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B3090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2F6090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 307090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 14D090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B7090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 161090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2C9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: CC090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 66090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: AD090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 14B090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 101090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: D9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: F1090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 6E090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 93090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: AD090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 236090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 97090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 105090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 7B090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 102090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 9C090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 85090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: AA090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: CE090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: F7090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: FC090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B4090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 20E090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 68090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B3090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 287090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2CC090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 5A090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2C6090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 12F090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B5090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 228090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: A5090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 1A090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: A5090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: FD090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: F9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 60090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 104090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B3090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2C9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 124090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: AB090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: FD090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B3090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: FD090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: AE090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 238090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B8090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 7F090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2DD090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2F3090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 120090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2CE090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B9090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 28C090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 122090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 90090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: F1090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 28F090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 282090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: F2090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: BE090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 2D8090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: E3090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: A6090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 29B090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 54090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: B7090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: EE090B | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Thread created: unknown EIP: 74090B | Jump to behavior |
Source: C:\Windows\explorer.exe | Thread created: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe EIP: 1C090B | Jump to behavior |
Source: C:\Windows\explorer.exe | Thread created: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe EIP: 1C090B | Jump to behavior |
Source: C:\Users\user\Desktop\java.exe | Memory written: C:\Windows\SysWOW64\winver.exe base: 3318B0 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\explorer.exe base: 1340000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\sihost.exe base: AC0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\svchost.exe base: 910000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\svchost.exe base: 9A0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\ctfmon.exe base: A50000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\explorer.exe base: 1370000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\svchost.exe base: D40000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B50000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 110000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: A90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: AB0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 290000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 580000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 3D0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 900000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 180000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A10000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 190000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F10000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 10000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\svchost.exe base: D0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\dllhost.exe base: 260000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\SysWOW64\cscript.exe base: 4D80000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\conhost.exe base: 880000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\conhost.exe base: 900000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\backgroundTaskHost.exe base: C50000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 890000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 30000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1530000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2770000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B80000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 8B0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B50000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2EB0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2D10000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2B40000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2E20000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: BE0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2CA0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: C40000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1120000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2F40000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2F60000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 3070000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 14D0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B70000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1610000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2C90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: CC0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 660000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AD0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 14B0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1010000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: D90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F10000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 6E0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 930000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AD0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2360000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 970000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1050000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 7B0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1020000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 9C0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 850000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AA0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: CE0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F70000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FC0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B40000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 20E0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 680000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2870000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2CC0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 5A0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2C60000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 12F0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B50000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2280000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: A50000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1A0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: A50000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FD0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1040000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2C90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1240000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AB0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FD0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B30000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: FD0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: AE0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2380000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B80000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 7F0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2DD0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2F30000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1200000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2CE0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B90000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 28C0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 1220000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 900000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F10000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 28F0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2820000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: F20000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: BE0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 2D80000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: E30000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: A60000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 29B0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 540000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: B70000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: EE0000 | Jump to behavior |
Source: C:\Windows\SysWOW64\winver.exe | Memory written: C:\Program Files (x86)\UEZVPAWBrVuxNtrMwzEvCsWkYCyFbIKeGSMxqYElFJBZQmOcXHXKNlbXOsnnzpaFjUa\BjCNEZCMnwLaEEzWr.exe base: 740000 | Jump to behavior |
Source: C:\Windows\explorer.exe | Memory written: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe base: 1C0000 | Jump to behavior |
Source: C:\Windows\explorer.exe | Memory written: C:\Users\user\AppData\Roaming\0C0BC82C\bin.exe base: 1C0000 | Jump to behavior |