Source: wscript.exe, 00000000.00000003.186393509.000001F4683A2000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.186418382.000001F46837E000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.189410935.000002156F153000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.189436287.000002156F172000.00000004.00000001.sdmp, ibfmvoj.exe, 00000007.00000002.456011040.000001F7A3FBC000.00000004.00000001.sdmp, ibfmvoj.exe, 00000007.00000003.196507204.000001F7A3F93000.00000004.00000001.sdmp, ibfmvoj.exe, 00000008.00000003.197704132.000001D32E6D3000.00000004.00000001.sdmp, ibfmvoj.exe, 00000008.00000002.457059419.000001D32E6FC000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000A.00000003.221994651.000001F1F824C000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000A.00000003.221297281.000001F1F8223000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000B.00000003.236818352.0000025BBDB9C000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000B.00000003.236186995.0000025BBDB73000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000E.00000003.254530291.000001DBCE562000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000E.00000003.254624235.000001DBCE543000.00000004.00000001.sdmp | String found in binary or memory: http://101legit.com/ |
Source: wscript.exe, 00000002.00000003.203396181.000002156F014000.00000004.00000001.sdmp, wscript.exe, 00000002.00000002.459547225.000002156F812000.00000004.00000001.sdmp | String found in binary or memory: http://101legit.com/0.html |
Source: wscript.exe, 00000002.00000002.459496028.000002156F700000.00000004.00000001.sdmp | String found in binary or memory: http://101legit.com/0.html1 |
Source: wscript.exe, 00000002.00000003.202889828.000002156F338000.00000004.00000001.sdmp | String found in binary or memory: http://101legit.com/0.htmle843 |
Source: wscript.exe, 00000002.00000003.210274976.000002156F880000.00000004.00000001.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: http://github.com/aFarkas/lazysizes |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: http://github.com/requirejs/domReady |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: http://github.com/requirejs/requirejs/LICENSE |
Source: wscript.exe, 00000002.00000002.459601886.000002156F846000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.202884308.000002156F330000.00000004.00000001.sdmp | String found in binary or memory: http://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE2dCNN |
Source: wscript.exe, 00000002.00000002.459601886.000002156F846000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.202884308.000002156F330000.00000004.00000001.sdmp | String found in binary or memory: http://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE2dKBu |
Source: wscript.exe, 00000000.00000003.186393509.000001F4683A2000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.186418382.000001F46837E000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.189410935.000002156F153000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.189436287.000002156F172000.00000004.00000001.sdmp, ibfmvoj.exe, 00000007.00000002.456011040.000001F7A3FBC000.00000004.00000001.sdmp, ibfmvoj.exe, 00000007.00000003.196507204.000001F7A3F93000.00000004.00000001.sdmp, ibfmvoj.exe, 00000008.00000003.197704132.000001D32E6D3000.00000004.00000001.sdmp, ibfmvoj.exe, 00000008.00000002.457059419.000001D32E6FC000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000A.00000003.221994651.000001F1F824C000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000A.00000003.221297281.000001F1F8223000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000B.00000003.236818352.0000025BBDB9C000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000B.00000003.236186995.0000025BBDB73000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000E.00000003.254530291.000001DBCE562000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000E.00000003.254624235.000001DBCE543000.00000004.00000001.sdmp | String found in binary or memory: http://legitville.com/ |
Source: wscript.exe, 00000002.00000002.459496028.000002156F700000.00000004.00000001.sdmp | String found in binary or memory: http://legitville.com/0.html |
Source: wscript.exe, 00000002.00000003.339266046.000002156F320000.00000004.00000001.sdmp | String found in binary or memory: http://legitville.com/0.htmlll |
Source: wscript.exe, 00000002.00000003.210274976.000002156F880000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: wscript.exe, 00000002.00000003.210274976.000002156F880000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: wscript.exe, 00000002.00000003.210219910.000002156F351000.00000004.00000001.sdmp | String found in binary or memory: http://requirejs.org/docs/errors.html# |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: http://schema.org/Organization |
Source: wscript.exe, 00000002.00000002.459601886.000002156F846000.00000004.00000001.sdmp | String found in binary or memory: http://ww7.101legit.com |
Source: wscript.exe, 00000002.00000003.210589425.000002156F82B000.00000004.00000001.sdmp, wscript.exe, 00000002.00000002.459547225.000002156F812000.00000004.00000001.sdmp | String found in binary or memory: http://ww7.101legit.com/ |
Source: wscript.exe, 00000002.00000003.210589425.000002156F82B000.00000004.00000001.sdmp | String found in binary or memory: http://ww7.101legit.com/ll |
Source: wscript.exe, 00000000.00000003.188728848.000001F46835C000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.186393509.000001F4683A2000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.189473003.000002156F12D000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.189436287.000002156F172000.00000004.00000001.sdmp, ibfmvoj.exe, 00000007.00000002.456011040.000001F7A3FBC000.00000004.00000001.sdmp, ibfmvoj.exe, 00000007.00000003.196514570.000001F7A3F6D000.00000004.00000001.sdmp, ibfmvoj.exe, 00000008.00000003.197733159.000001D32E6AD000.00000004.00000001.sdmp, ibfmvoj.exe, 00000008.00000002.457059419.000001D32E6FC000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000A.00000003.221994651.000001F1F824C000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000B.00000003.236818352.0000025BBDB9C000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000B.00000003.236226752.0000025BBDB4D000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000E.00000003.254530291.000001DBCE562000.00000004.00000001.sdmp, ibfmvoj.exe, 0000000E.00000003.254663132.000001DBCE51D000.00000004.00000001.sdmp | String found in binary or memory: http://www.google.com/ |
Source: ibfmvoj.exe, 0000000A.00000003.221366463.000001F1F81FD000.00000004.00000001.sdmp | String found in binary or memory: http://www.google.com/0 |
Source: wscript.exe, 00000002.00000003.210512662.000002156F34E000.00000004.00000001.sdmp | String found in binary or memory: https://assets.onestore.ms |
Source: wscript.exe, 00000002.00000002.459601886.000002156F846000.00000004.00000001.sdmp | String found in binary or memory: https://azure.micro |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://channel9.msdn.com/ |
Source: wscript.exe, 00000002.00000003.210512662.000002156F34E000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31 |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE3NYMe?ver=7b0e&q= |
Source: wscript.exe, 00000002.00000003.210157018.000002156D1D6000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4D5uF?ver=204a&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DRie?ver=f61d&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DfTp?ver=8993&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4E4rT?ver=2072&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4H9G0?ver=5bb0&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4HCqV?ver=5c59&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Mznr?ver=36b6&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4pkvE?ver=d8fc&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4pndL?ver=5217&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4pxBu?ver=eae5&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4rriw?ver=b2d5&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4rzE2?ver=aa0b&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4sO6R?ver=7d62&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4sQDc?ver=30c2&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4u7Rm?ver=6f53&q= |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4vykv?ver=6019&q= |
Source: wscript.exe, 00000002.00000003.210512662.000002156F34E000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.210173138.000002156F279000.00000004.00000001.sdmp | String found in binary or memory: https://mem.gfx.ms |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://mem.gfx.ms/meversion?partner=MSHomePage&market=de-ch&uhf=1 |
Source: wscript.exe, 00000002.00000003.210512662.000002156F34E000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.202797295.000002156F850000.00000004.00000001.sdmp | String found in binary or memory: https://microsoftwindows.112.2o7.net |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://onedrive.live.com/about/de-ch/ |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://outlook.live.com/owa/ |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://products.office.com/de-ch/academic/compare-office-365-education-plans |
Source: wscript.exe, 00000002.00000002.459601886.000002156F846000.00000004.00000001.sdmp | String found in binary or memory: https://products.office~ |
Source: wscript.exe, 00000002.00000003.202884308.000002156F330000.00000004.00000001.sdmp | String found in binary or memory: https://publisher.liveperson.net |
Source: wscript.exe, 00000002.00000003.202884308.000002156F330000.00000004.00000001.sdmp | String found in binary or memory: https://publisher.liveperson.net/iframe-le-tag/iframe.html?lpsite=60270350&lpsection=store-sales |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://schema.org/ItemList |
Source: wscript.exe, 00000002.00000002.459601886.000002156F846000.00000004.00000001.sdmp, wscript.exe, 00000002.00000003.202884308.000002156F330000.00000004.00000001.sdmp | String found in binary or memory: https://swiftkey.com/images/misc/stores/app/en.png |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://twitter.com/microsoft_ch |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://ussearchprod.trafficmanager.net/services/api/v1.0/store/categories |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://www.instagram.com/microsoftch/ |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://www.linkedin.com/company/1035 |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://www.onenote.com/?omkt=de-CH |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://www.skype.com/de/ |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://www.xbox.com/ |
Source: wscript.exe, 00000002.00000003.210110395.000002156D213000.00000004.00000001.sdmp | String found in binary or memory: https://www.youtube.com/user/MicrosoftCH |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |
Source: C:\Users\user\AppData\Local\nsoerwoel\ibfmvoj.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process |