Source: | Binary string: kernel32.pdbUGP source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdbUGP source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280CF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280001000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280001000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: OpenWith.exe, 0000000A.00000002.3397772991.0000002FE82AB000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7 |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280CF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.org |
Source: powershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.orgX |
Source: Yara match | File source: 10.3.OpenWith.exe.166561b0000.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.3.OpenWith.exe.166561b0000.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.3.OpenWith.exe.16655ed0000.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.3.khle.exe.20c80b30000.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.3.khle.exe.20c80b30000.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.3.khle.exe.20c80850000.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.3.khle.exe.20c80850000.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: khle.exe PID: 7904, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: OpenWith.exe PID: 7932, type: MEMORYSTR |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD818D7 | 9_3_00007FF79CD818D7 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80014A54 | 9_3_0000020C80014A54 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80013CEC | 9_3_0000020C80013CEC |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80011500 | 9_3_0000020C80011500 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80012F00 | 9_3_0000020C80012F00 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C8001870C | 9_3_0000020C8001870C |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C8001710C | 9_3_0000020C8001710C |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80015BC0 | 9_3_0000020C80015BC0 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80019FFC | 9_3_0000020C80019FFC |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80018A58 | 9_3_0000020C80018A58 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80023E95 | 9_3_0000020C80023E95 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_3_0000016653BC0967 | 10_3_0000016653BC0967 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EF2E90 | 10_2_0000016655EF2E90 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EE1A98 | 10_2_0000016655EE1A98 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655ED3618 | 10_2_0000016655ED3618 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EEF9CC | 10_2_0000016655EEF9CC |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EF1DE0 | 10_2_0000016655EF1DE0 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655ED8194 | 10_2_0000016655ED8194 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EE556C | 10_2_0000016655EE556C |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EF4CD8 | 10_2_0000016655EF4CD8 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EEBCA8 | 10_2_0000016655EEBCA8 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EE9C54 | 10_2_0000016655EE9C54 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EEC040 | 10_2_0000016655EEC040 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655ED943C | 10_2_0000016655ED943C |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EF1FF8 | 10_2_0000016655EF1FF8 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EEE788 | 10_2_0000016655EEE788 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655ED9788 | 10_2_0000016655ED9788 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EEC34C | 10_2_0000016655EEC34C |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EEBB28 | 10_2_0000016655EEBB28 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EF2720 | 10_2_0000016655EF2720 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EF22F4 | 10_2_0000016655EF22F4 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_2_0000016655EE5AE0 | 10_2_0000016655EE5AE0 |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1" | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe "C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Users\Public\Documents\khle.exe C:\Users\Public\Documents\khle.exe | |
Source: C:\Users\Public\Documents\khle.exe | Process created: C:\Windows\System32\OpenWith.exe "C:\Windows\system32\openwith.exe" | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe "C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Users\Public\Documents\khle.exe C:\Users\Public\Documents\khle.exe | Jump to behavior |
Source: C:\Users\Public\Documents\khle.exe | Process created: C:\Windows\System32\OpenWith.exe "C:\Windows\system32\openwith.exe" | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: taskflowdataengine.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cdp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dsreg.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\Documents\khle.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\Public\Documents\khle.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\Public\Documents\khle.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: wudfplatform.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: | Binary string: kernel32.pdbUGP source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdbUGP source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF848A65CC3 push eax; iretd | 0_2_00007FF848A65CD1 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD8220B push eax; iretd | 9_3_00007FF79CD82224 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD86C12 push edx; retf | 9_3_00007FF79CD86C26 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD859E3 push esi; retf | 9_3_00007FF79CD859E6 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD835EC push esi; ret | 9_3_00007FF79CD835ED |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD817D5 push cs; ret | 9_3_00007FF79CD818C4 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD840F7 push eax; ret | 9_3_00007FF79CD840FB |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD8430B push eax; retf | 9_3_00007FF79CD8430C |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD85ED9 push esi; ret | 9_3_00007FF79CD85EDD |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD862E3 push ebx; ret | 9_3_00007FF79CD862E6 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD848BE push eax; retf | 9_3_00007FF79CD848BF |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD84EB2 pushad ; retf | 9_3_00007FF79CD84EB3 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD81865 push cs; ret | 9_3_00007FF79CD818C4 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD85643 push eax; retf | 9_3_00007FF79CD85645 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_00007FF79CD84427 pushad ; ret | 9_3_00007FF79CD84428 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C8001C219 pushad ; retf | 9_3_0000020C8001C221 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80023E95 push ebp; retf | 9_3_0000020C80023E94 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C800274C6 push esi; ret | 9_3_0000020C800274CA |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C8002BACB pushad ; iretd | 9_3_0000020C80352EB3 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C800256D9 push ecx; ret | 9_3_0000020C80025700 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80024B35 push ss; iretd | 9_3_0000020C8031919F |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80028560 push ds; retf | 9_3_0000020C80028577 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80025C06 push esi; ret | 9_3_0000020C80025C07 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C8002B627 push ebp; iretd | 9_3_0000020C8002B628 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_3_0000020C80023E70 push ebp; retf | 9_3_0000020C80023E94 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_2_00007FF79CD293E6 push 3C95CC23h; iretd | 9_2_00007FF79CD293EB |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_2_00007FF79CD2A778 pushfq ; iretd | 9_2_00007FF79CD2A779 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_2_00007FF79CD24918 push rsi; retf | 9_2_00007FF79CD24923 |
Source: C:\Users\Public\Documents\khle.exe | Code function: 9_2_00007FF79CD296B5 push FFFFFF81h; retf | 9_2_00007FF79CD296B7 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_3_0000016653BC0865 push cs; ret | 10_3_0000016653BC0954 |
Source: C:\Windows\System32\OpenWith.exe | Code function: 10_3_0000016653BC5CA2 push edx; retf | 10_3_0000016653BC5CB6 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\Public\Documents\khle.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: REGMON.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDBG.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X32DBG.EXEOLLYDBG.EXEPROCESSHACKER.EXEIDAQ64.EXEAUTORUNS.EXEDUMPCAP.EXEDE4DOT.EXEHOOKEXPLORER.EXEILSPY.EXELORDPE.EXEDNSPY.EXEPETOOLS.EXEAUTO |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNS.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PETOOLS.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ON.EXEREGMON.EXEWINDANR.EXEWINDBG.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE |
Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDANR.EXE |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |