Source: system.exe, 00000000.00000002.1819285467.00000252161C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: system.exe | String found in binary or memory: https://api.telegram.org/bot |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: system.exe, 00000000.00000002.1819285467.00000252161C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://get.geojs.io |
Source: system.exe, 00000000.00000002.1819285467.00000252161C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://get.geojs.io/v1/ip/geo.json |
Source: system.exe | String found in binary or memory: https://get.geojs.io/v1/ip/geo.json)root |
Source: system.exe, 00000000.00000002.1819285467.0000025216258000.00000004.00000800.00020000.00000000.sdmp, system.exe, 00000000.00000002.1819285467.000002521621A000.00000004.00000800.00020000.00000000.sdmp, [US]173.254.250.90-Phemedrone-Report.zip.0.dr | String found in binary or memory: https://t.me/ |
Source: [US]173.254.250.90-Phemedrone-Report.zip.0.dr | String found in binary or memory: https://t.me/TheDyer |
Source: system.exe, 00000000.00000002.1819285467.0000025216258000.00000004.00000800.00020000.00000000.sdmp, system.exe, 00000000.00000002.1819285467.000002521621A000.00000004.00000800.00020000.00000000.sdmp, [US]173.254.250.90-Phemedrone-Report.zip.0.dr | String found in binary or memory: https://t.me/freakcodingspot |
Source: [US]173.254.250.90-Phemedrone-Report.zip.0.dr | String found in binary or memory: https://t.me/webster480 |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: system.exe, 00000000.00000002.1819818977.00000252262B2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2152 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6800 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2580 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3872 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6456 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2144 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 784 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3864 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5584 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1176 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 408 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6440 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1724 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3420 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6308 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2552 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6428 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 824 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1252 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2544 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3404 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3832 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6848 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5552 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5116 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1236 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2528 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4856 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2524 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3816 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5108 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2044 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 364 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6396 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5964 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1652 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5484 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 356 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1216 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2508 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5092 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4660 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 776 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 344 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2496 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3788 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1200 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5076 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2488 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6896 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5724 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 324 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 752 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3768 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4196 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2900 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4192 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2036 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5052 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6196 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 736 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3752 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4180 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6276 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5900 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6824 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6756 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2012 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3304 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2004 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1572 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4348 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1136 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 696 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6728 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6296 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7156 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1552 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6596 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5860 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3704 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2064 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5856 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2924 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5816 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7140 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4984 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1104 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2396 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1532 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 5408 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4544 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 2388 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1956 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6264 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1948 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1084 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7116 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1940 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6680 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 4092 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6244 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1932 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 3924 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1496 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 7096 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 628 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 1488 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6224 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 620 |
Source: C:\Users\user\Desktop\system.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT CommandLine FROM Win32_Process WHERE ProcessId = 6288 |
Source: C:\Users\user\Desktop\system.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\system.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |