File name:

setup.exe

Full analysis: https://app.any.run/tasks/d49cf7b4-fea7-48bb-bcfb-a0c220dcca62
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 03, 2025, 18:43:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

EE24CB527C53154D53E4137D823A630E

SHA1:

7D4CBF2D41C3C20C1E0E517A401CC4EDAEF6D6FB

SHA256:

E8187DA4493FFC862CCE94A2889B2D63253A62B4EAC8FE75CB0AC9E5891417B1

SSDEEP:

12288:NRxWM7BMmKQSqeo/cMcD1StqZZrAttJVVVVVVVVVVVVVVVVVVVOVVVVVVVVVVVVY:NRb7BMmxXiwAA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • setup.exe (PID: 6332)
      • dfsvc.exe (PID: 6516)
    • Process requests binary or script from the Internet

      • dfsvc.exe (PID: 6516)
    • Reads Internet Explorer settings

      • dfsvc.exe (PID: 6516)
    • Potential Corporate Privacy Violation

      • dfsvc.exe (PID: 6516)
    • Executable content was dropped or overwritten

      • dfsvc.exe (PID: 6516)
    • Checks Windows Trust Settings

      • dfsvc.exe (PID: 6516)
    • The process creates files with name similar to system file names

      • dfsvc.exe (PID: 6516)
    • Process drops legitimate windows executable

      • dfsvc.exe (PID: 6516)
    • Creates a software uninstall entry

      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 5592)
    • Application launched itself

      • UpdateClient.exe (PID: 2324)
    • Starts POWERSHELL.EXE for commands execution

      • UpdateClient.exe (PID: 5592)
    • Searches for installed software

      • UpdateClient.exe (PID: 5592)
      • dfsvc.exe (PID: 6516)
  • INFO

    • The sample compiled with english language support

      • setup.exe (PID: 6332)
      • dfsvc.exe (PID: 6516)
    • Checks supported languages

      • setup.exe (PID: 6332)
      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 2324)
      • UpdateClient.exe (PID: 5592)
    • Reads the computer name

      • setup.exe (PID: 6332)
      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 2324)
      • UpdateClient.exe (PID: 5592)
    • Checks proxy server information

      • setup.exe (PID: 6332)
    • Disables trace logs

      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 5592)
    • Create files in a temporary directory

      • setup.exe (PID: 6332)
      • dfsvc.exe (PID: 6516)
    • Reads Environment values

      • dfsvc.exe (PID: 6516)
    • Sends debugging messages

      • dfsvc.exe (PID: 6516)
    • Process checks whether UAC notifications are on

      • dfsvc.exe (PID: 6516)
    • Reads the machine GUID from the registry

      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 5592)
    • Reads the software policy settings

      • dfsvc.exe (PID: 6516)
    • Creates files or folders in the user directory

      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 2324)
    • The process uses the downloaded file

      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 2324)
    • Process checks computer location settings

      • dfsvc.exe (PID: 6516)
      • UpdateClient.exe (PID: 2324)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:07:08 17:18:10+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.3
CodeSize: 392192
InitializedDataSize: 180736
UninitializedDataSize: -
EntryPoint: 0x3a257
OSVersion: 5.1
ImageVersion: 10
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 17.0.32708.82
ProductVersionNumber: 17.0.32708.82
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: -
FileDescription: Setup
FileVersion: 17.0.32708.82 built by: D17.3
InternalName: setup.exe
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: setup.exe
ProductName: -
ProductVersion: 17.0.32708.82
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setup.exe dfsvc.exe updateclient.exe no specs updateclient.exe powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2324"C:\Users\admin\AppData\Local\Apps\2.0\J6XAJDDB.B0K\8G7LB1RC.PVM\upda..tion_620d5c45c421855a_0001.0000_1382dba3490996d9\UpdateClient.exe" C:\Users\admin\AppData\Local\Apps\2.0\J6XAJDDB.B0K\8G7LB1RC.PVM\upda..tion_620d5c45c421855a_0001.0000_1382dba3490996d9\UpdateClient.exedfsvc.exe
User:
admin
Company:
HVDC
Integrity Level:
MEDIUM
Description:
UpdateClient
Exit code:
0
Version:
1.0.5.5
Modules
Images
c:\users\admin\appdata\local\apps\2.0\j6xajddb.b0k\8g7lb1rc.pvm\upda..tion_620d5c45c421855a_0001.0000_1382dba3490996d9\updateclient.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5256"powershell" $psversiontableC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeUpdateClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
4294967295
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5592"C:\Users\admin\AppData\Local\Apps\2.0\J6XAJDDB.B0K\8G7LB1RC.PVM\upda..tion_620d5c45c421855a_0001.0000_1382dba3490996d9\UpdateClient.exe" Elevated /user=adminC:\Users\admin\AppData\Local\Apps\2.0\J6XAJDDB.B0K\8G7LB1RC.PVM\upda..tion_620d5c45c421855a_0001.0000_1382dba3490996d9\UpdateClient.exe
UpdateClient.exe
User:
admin
Company:
HVDC
Integrity Level:
HIGH
Description:
UpdateClient
Version:
1.0.5.5
Modules
Images
c:\users\admin\appdata\local\apps\2.0\j6xajddb.b0k\8g7lb1rc.pvm\upda..tion_620d5c45c421855a_0001.0000_1382dba3490996d9\updateclient.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6332"C:\Users\admin\AppData\Local\Temp\setup.exe" C:\Users\admin\AppData\Local\Temp\setup.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup
Exit code:
0
Version:
17.0.32708.82 built by: D17.3
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6516"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
ClickOnce
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\dfsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
15 122
Read events
14 805
Write events
277
Delete events
40

Modification events

(PID) Process:(6332) setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6332) setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6332) setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6516) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
JWY2QEVNYQMQQZY9ZM7MDYWC
(PID) Process:(6516) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete valueName:ComponentStore_RandomString
Value:
JWY2QEVNYQMQQZY9ZM7MDYWC
(PID) Process:(6516) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete keyName:(default)
Value:
(PID) Process:(6516) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
J6XAJDDBB0K8G7LB1RCPVMYP
(PID) Process:(6516) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
Operation:writeName:StateStore_RandomString
Value:
YG28WPX8Y8VD1A79PNHV0Q44
(PID) Process:(6516) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6516) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
40
Suspicious files
22
Text files
52
Unknown types
0

Dropped files

PID
Process
Filename
Type
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\MD93AX95.58K\VTOYD13C.1TY\UpdateClient.exe.manifestxml
MD5:9091A95E9C9FD8C4B582DAE305A8910E
SHA256:8C9648F3ABE49FC5E6D95F354E2F247253338CC07EDF431A2F44D6ECC42394A1
6332setup.exeC:\Users\admin\AppData\Local\Temp\VSD5353.tmp\install.logbinary
MD5:0C361507FC0CAB2764C255C973706698
SHA256:892069139F865D1AF67B8B5EC323B075F1A0EA4FB8E7DE69F3D38A3BE86195C7
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\MD93AX95.58K\VTOYD13C.1TY\SocketTools9.Interop.dllexecutable
MD5:186BE895959ADD7F6BC2553A9FFE9C66
SHA256:50DD7564DD0270EE6CE455A003EBE1A2DCC80422233BC387DE1C502612E101EE
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\MD93AX95.58K\VTOYD13C.1TY\Resources\hvdc.icoimage
MD5:F852EB1E203DD62444B391C8577B7E52
SHA256:CBAF89A2F5D1D7300BC4A50A1D9116F371B2F37ECFA173EBBCBBEDD003D52561
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\MD93AX95.58K\VTOYD13C.1TY\SocketTools9.TraceLog.dllexecutable
MD5:303092E2E861742FF10391B529A3A71E
SHA256:C6F825DF53EF2CF6516D57A4A2905C9920DF2E28BEF8EE1CBD9E36CECEA2AA8E
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\MD93AX95.58K\VTOYD13C.1TY\UpdateClient.exe.configxml
MD5:4D0B084DDB6F9F5290A7835515BBCA2C
SHA256:AA8718A397D9723624FAA609AD35918D3BE0EAD1D0DCACAE4F6B782796D927F1
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\KE1B79AZ.JVV\7AY7QQA5.MWT.applicationxml
MD5:BA2BD87079A0A984404E3ECB37DF8027
SHA256:8285C54FE405915CC4D3E1FB9B5186350E66024E899321A1E2CA31A0D484BFBC
6332setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\UpdateClient[1].applicationxml
MD5:BA2BD87079A0A984404E3ECB37DF8027
SHA256:8285C54FE405915CC4D3E1FB9B5186350E66024E899321A1E2CA31A0D484BFBC
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\MD93AX95.58K\VTOYD13C.1TY\ComponentPro.Network.dllexecutable
MD5:66D6ADC1815A2633DA74907E4E591E24
SHA256:FC4391E238A34CC32C2F51C63992AAB3C9696626BB7609B5D1B1F9CFC5F2E6DB
6516dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\MD93AX95.58K\VTOYD13C.1TY\Interop.IWshRuntimeLibrary.dllexecutable
MD5:45833AFD896E74D37C224FB87EC22A99
SHA256:5387A280EE079A488CA47301772D5CE6A7D730AEEF8A3E9BC29A35C4DE70040C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
31
TCP/UDP connections
32
DNS requests
19
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6516
dfsvc.exe
GET
200
52.92.193.107:80
http://updater.pscad.com/updater/Application%20Files/UpdateClient_1_0_5_5/UpdateClient.exe
unknown
unknown
6516
dfsvc.exe
GET
200
52.92.193.107:80
http://updater.pscad.com/updater/Application%20Files/UpdateClient_1_0_5_5/Interop.SHDocVw.dll
unknown
unknown
6516
dfsvc.exe
GET
200
52.92.193.107:80
http://updater.pscad.com/updater/Application%20Files/UpdateClient_1_0_5_5/XmlProperty.dll
unknown
unknown
6516
dfsvc.exe
GET
200
52.92.193.107:80
http://updater.pscad.com/updater/Application%20Files/UpdateClient_1_0_5_5/ComponentPro.FileSystem.dll
unknown
unknown
6516
dfsvc.exe
GET
200
52.92.193.107:80
http://updater.pscad.com/updater/Application%20Files/UpdateClient_1_0_5_5/SocketTools.HttpClient.dll
unknown
unknown
GET
200
2.16.164.40:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6332
setup.exe
GET
200
52.92.193.107:80
http://updater.pscad.com/updater/UpdateClient.application
unknown
unknown
6516
dfsvc.exe
GET
200
52.92.193.107:80
http://updater.pscad.com/updater/UpdateClient.application
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
640
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.40:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
6332
setup.exe
52.92.193.107:80
updater.pscad.com
AMAZON-02
US
suspicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 216.58.212.142
whitelisted
crl.microsoft.com
  • 2.16.164.40
  • 2.16.164.72
  • 2.16.164.49
  • 2.16.164.34
  • 2.16.164.24
whitelisted
www.microsoft.com
  • 184.30.230.103
  • 95.101.149.131
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.221
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
updater.pscad.com
  • 52.92.193.107
  • 52.92.235.219
  • 52.92.161.83
  • 52.92.147.11
  • 52.92.203.139
  • 52.92.203.35
  • 52.92.130.83
  • 52.92.129.131
unknown
login.live.com
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.138
  • 40.126.32.136
  • 20.190.160.22
  • 40.126.32.134
  • 20.190.160.17
  • 40.126.32.72
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

PID
Process
Class
Message
6516
dfsvc.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
6516
dfsvc.exe
Misc activity
ET INFO EXE - Served Attached HTTP
6516
dfsvc.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6516
dfsvc.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
6516
dfsvc.exe
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
6516
dfsvc.exe
Misc activity
ET INFO EXE - Served Attached HTTP
Process
Message
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230