Source: wiservice.exe, 0000001A.00000003.456532559.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456280842.0000000001493000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca |
Source: wiservice.exe, 0000001A.00000003.488729555.000000000148B000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410695367.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456532559.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410568357.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424161941.0000000001494000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456280842.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.499579135.0000000001491000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.X |
Source: wiservice.exe, 00000017.00000002.528558299.00000000044C2000.00000004.00000800.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.381124632.0000000001477000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410666524.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501542333.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501649692.0000000001476000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456218960.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456485795.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361770400.0000000001477000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.488665706.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl |
Source: wiservice.exe, 0000001A.00000003.456159103.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.527466388.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501542333.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456250360.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456179043.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361812004.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410695367.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501378884.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410568357.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.526949432.0000000001452000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456541397.0000000001458000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501589540.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361757994.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456375063.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424161941.0000000001494000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410543165.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.488723507.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456342456.00000000014A7000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501525875.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456513551.0000000001487000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: wiservice.exe, 0000001A.00000003.381124632.0000000001477000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361770400.0000000001477000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crla |
Source: wiservice.exe, 0000001A.00000003.410666524.000000000146E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlxe |
Source: wiservice.exe, 0000001A.00000003.501542333.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501649692.0000000001476000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlxeA |
Source: wiservice.exe, 0000001A.00000003.410666524.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.527466388.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501542333.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456250360.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456179043.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361812004.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456218960.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456485795.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424191151.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501378884.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.526949432.0000000001452000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424235111.0000000001476000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501589540.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361757994.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456375063.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410543165.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.488723507.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501525875.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456513551.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501455907.0000000001486000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0# |
Source: wiservice.exe, 00000011.00000002.302088034.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000011.00000000.284099252.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000000.299073344.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000002.315334409.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000000.303468768.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.524835794.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000002.524955722.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000000.306896832.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000002.524921094.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000000.315146393.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000000.316467326.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000021.00000000.318015370.00000000008C8000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: http://jimmac.musichall.cz |
Source: SetupWIService.exe, SetupWIService.exe, 00000000.00000000.253380165.000000000040A000.00000008.00000001.01000000.00000003.sdmp, SetupWIService.exe, 00000000.00000002.519191045.000000000040A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: SetupWIService.exe, 00000000.00000000.253380165.000000000040A000.00000008.00000001.01000000.00000003.sdmp, SetupWIService.exe, 00000000.00000002.519191045.000000000040A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: wiservice.exe, 0000001A.00000003.467025367.00000000014A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.com |
Source: wiservice.exe, 0000001A.00000003.456375063.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424161941.0000000001494000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com |
Source: wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com# |
Source: wiservice.exe, 00000017.00000002.528477199.00000000041D0000.00000004.00000800.00020000.00000000.sdmp, wiservice.exe, 00000017.00000002.528497117.00000000041D8000.00000004.00000800.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456159103.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.381124632.0000000001477000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.527466388.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456250360.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410695367.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501378884.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410568357.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361770400.0000000001477000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456151572.00000000014A2000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456523277.000000000148B000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.381142482.0000000001479000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410531742.0000000001482000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361742957.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456270353.000000000148B000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501370286.00000000014A2000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501589540.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424161941.0000000001494000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.488437791.000000000144D000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410554525.000000000148B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: wiservice.exe, 0000001A.00000003.424161941.0000000001494000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.comA |
Source: wiservice.exe, 0000001A.00000003.501542333.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501649692.0000000001476000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456218960.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456485795.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.526949432.0000000001452000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.488665706.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.comer |
Source: wiservice.exe, 0000001A.00000003.456179043.0000000001451000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.comu |
Source: wiservice.exe, 0000001A.00000003.410695367.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410568357.0000000001493000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.comv |
Source: wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com |
Source: wiservice.exe, 0000001A.00000003.456218960.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456485795.000000000146E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com0.1:988 |
Source: wiservice.exe, 00000017.00000002.528477199.00000000041D0000.00000004.00000800.00020000.00000000.sdmp, wiservice.exe, 00000017.00000002.528497117.00000000041D8000.00000004.00000800.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.381124632.0000000001477000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410666524.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.527466388.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501542333.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456250360.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456179043.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361812004.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424191151.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501378884.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361770400.0000000001477000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.526949432.0000000001452000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456151572.00000000014A2000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456523277.000000000148B000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.381142482.0000000001479000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410531742.0000000001482000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361742957.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424235111.0000000001476000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456270353.000000000148B000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501370286.00000000014A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com09 |
Source: svchost.exe, 00000019.00000002.336849459.0000028211613000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.bingmapsportal.com |
Source: wiservice.exe, 00000011.00000002.302088034.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000011.00000000.284099252.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000000.299073344.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000002.315334409.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000000.303468768.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.524835794.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000002.524955722.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000000.306896832.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000002.524921094.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000000.315146393.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000000.316467326.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000021.00000000.318015370.00000000008C8000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.gimp.orgg |
Source: svchost.exe, 00000014.00000002.522519332.00000298D083E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 00000014.00000002.522519332.00000298D083E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 00000014.00000002.522519332.00000298D083E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.com |
Source: svchost.exe, 00000014.00000002.522519332.00000298D083E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.comt |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: wiservice.exe, 00000011.00000002.302088034.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000011.00000000.284099252.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000000.299073344.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000002.315334409.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.526256114.0000000001488000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 00000015.00000000.303468768.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.524835794.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000002.524955722.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000000.306896832.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000002.524921094.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000000.315146393.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000003.320239556.00000000014C1000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001F.00000000.316467326.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000003.320322856.00000000014C6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 00000021.00000000.318015370.00000000008C8000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: https://backtrace.wildix.com/api/v1/IntegrationService/Trace/ |
Source: wiservice.exe, 0000001F.00000003.320239556.00000000014C1000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001F.00000003.320322856.00000000014C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://backtrace.wildix.com/api/v1/IntegrationService/Trace//e0 |
Source: wiservice.exe, 00000015.00000002.526256114.0000000001488000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://backtrace.wildix.com/api/v1/IntegrationService/Trace/pG |
Source: wiservice.exe, 00000011.00000002.302088034.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000011.00000000.284099252.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000000.299073344.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000002.315334409.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000000.303468768.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.524835794.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000002.524955722.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000000.306896832.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000002.524921094.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000000.315146393.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000000.316467326.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000021.00000000.318015370.00000000008C8000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: https://backtrace.wildix.com/api/v1/IntegrationService/Trace/sysInfo.txtignored_processed_--dumpSend |
Source: svchost.exe, 00000014.00000002.522519332.00000298D083E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000014.00000002.522519332.00000298D083E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device |
Source: wiservice.exe, 00000011.00000002.302088034.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000011.00000000.284099252.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000000.299073344.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000002.315334409.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000000.303468768.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.524835794.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000002.524955722.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000000.306896832.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000002.524921094.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000000.315146393.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000000.316467326.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000021.00000000.318015370.00000000008C8000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000019.00000002.336948474.000002821165C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/ |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 00000019.00000002.336907549.000002821163D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 00000019.00000002.336948474.000002821165C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/ |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 00000019.00000003.336575813.0000028211648000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.336938385.000002821164E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 00000019.00000002.336948474.000002821165C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/ |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations |
Source: svchost.exe, 00000019.00000002.336907549.000002821163D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 00000019.00000002.336918393.0000028211642000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336651251.0000028211640000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 00000019.00000002.336918393.0000028211642000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336651251.0000028211640000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 00000019.00000002.336948474.000002821165C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336651251.0000028211640000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000019.00000002.336948474.000002821165C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000019.00000002.336948474.000002821165C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000019.00000003.336644255.0000028211645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336651251.0000028211640000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.336614965.000002821165A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 00000019.00000003.336606467.0000028211660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 00000019.00000002.336907549.000002821163D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000019.00000003.307877117.0000028211631000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: wiservice.exe, 00000011.00000002.302088034.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000011.00000000.284099252.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000000.299073344.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000002.315334409.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000000.303468768.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.524835794.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000002.524955722.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000000.306896832.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000002.524921094.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000000.315146393.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000000.316467326.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000021.00000000.318015370.00000000008C8000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: https://feedback.wildix.com/api/v1/Analytics/wiservice |
Source: wiservice.exe, 00000011.00000002.302088034.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000011.00000000.284099252.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000000.299073344.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000013.00000002.315334409.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000000.303468768.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000015.00000002.524835794.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000002.524955722.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000017.00000000.306896832.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000002.524921094.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001A.00000000.315146393.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 0000001F.00000000.316467326.00000000008C8000.00000002.00000001.01000000.00000007.sdmp, wiservice.exe, 00000021.00000000.318015370.00000000008C8000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: https://feedback.wildix.com/api/v1/Analytics/wiserviceappNamedataextextensionapppbxhostnameuserconte |
Source: wiservice.exe, 0000001A.00000003.410666524.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.527466388.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501542333.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456250360.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456179043.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361812004.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424191151.000000000146E000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501378884.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000002.526949432.0000000001452000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.424235111.0000000001476000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501589540.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.361757994.0000000001493000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456375063.0000000001451000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501401647.0000000001450000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.410543165.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.488723507.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501525875.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.456513551.0000000001487000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.501455907.0000000001486000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.488476902.0000000001453000.00000004.00000020.00020000.00000000.sdmp, wiservice.exe, 0000001A.00000003.467055385.0000000001453000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sectigo.com/CPS0 |
Source: svchost.exe, 00000019.00000002.336907549.000002821163D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 00000019.00000002.336849459.0000028211613000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.336907549.000002821163D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000019.00000003.307877117.0000028211631000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000019.00000003.336644255.0000028211645000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000019.00000003.307877117.0000028211631000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.336898752.000002821163A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 00000019.00000003.336575813.0000028211648000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.336938385.000002821164E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen |
Source: unknown | Process created: C:\Users\user\Desktop\SetupWIService.exe C:\Users\user\Desktop\SetupWIService.exe | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM WIService.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM WIService.exe | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM WIui.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM WIui.exe | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM wirtpproxy.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM wirtpproxy.exe | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM wiservice-ui.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM wiservice-ui.exe | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM vncsrv.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM vncsrv.exe | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --proxyex | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --installsvc | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc | |
Source: unknown | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --hostsvc | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc | |
Source: unknown | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\WIService.exe" | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe" "C:\Program Files (x86)\Wildix\WIService\proxyex.lnk | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --watchdog | |
Source: unknown | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Windows\SysWOW64\NETSTAT.EXE | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe" "C:\Program Files (x86)\Wildix\WIService\wiservice.exe | |
Source: C:\Windows\explorer.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --proxyex | |
Source: unknown | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | |
Source: C:\Windows\explorer.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" | |
Source: unknown | Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k netsvcs -p | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Windows\SysWOW64\NETSTAT.EXE | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Windows\SysWOW64\NETSTAT.EXE | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Windows\SysWOW64\NETSTAT.EXE | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Windows\SysWOW64\NETSTAT.EXE | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM WIService.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM WIui.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM wirtpproxy.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM wiservice-ui.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C taskkill /F /IM vncsrv.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --proxyex | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --installsvc | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe" "C:\Program Files (x86)\Wildix\WIService\proxyex.lnk | Jump to behavior |
Source: C:\Users\user\Desktop\SetupWIService.exe | Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe" "C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM WIService.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM WIui.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM wirtpproxy.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM wiservice-ui.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM vncsrv.exe | Jump to behavior |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --watchdog | Jump to behavior |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | Jump to behavior |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Program Files (x86)\Wildix\WIService\wiservice.exe | Process created: C:\Windows\SysWOW64\NETSTAT.EXE netstat -ano -p tcp | |
Source: C:\Windows\explorer.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" --proxyex | |
Source: C:\Windows\explorer.exe | Process created: C:\Program Files (x86)\Wildix\WIService\wiservice.exe "C:\Program Files (x86)\Wildix\WIService\wiservice.exe" | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable | |