Source: lsass.exe, 00000031.00000002.2692346869.000001BA8E220000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: lsass.exe, 00000031.00000000.1409136630.000001BA8E23D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E29E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2700477885.000001BA8E283000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: lsass.exe, 00000031.00000002.2736247539.000001BA8E3E1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409782436.000001BA8E3CB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E29B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E297000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp, OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: lsass.exe, 00000031.00000002.2692346869.000001BA8E220000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: jnxsifnrdetl.exe, 00000035.00000003.1466293932.0000026FC3DC0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: jnxsifnrdetl.exe, 00000035.00000003.1466293932.0000026FC3DC0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: jnxsifnrdetl.exe, 00000035.00000003.1466293932.0000026FC3DC0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: jnxsifnrdetl.exe, 00000035.00000003.1466293932.0000026FC3DC0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: svchost.exe, 00000002.00000002.1398746540.0000016359062000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: lsass.exe, 00000031.00000002.2692346869.000001BA8E220000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: lsass.exe, 00000031.00000002.2736247539.000001BA8E3E1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409782436.000001BA8E3CB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E29B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E297000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp, OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 00000031.00000000.1409136630.000001BA8E23D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E29E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2700477885.000001BA8E283000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: lsass.exe, 00000031.00000002.2692346869.000001BA8E220000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiC |
Source: lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: lsass.exe, 00000031.00000000.1409136630.000001BA8E23D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E29E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2700477885.000001BA8E283000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: svchost.exe, 00000069.00000000.1576416010.000001B311C96000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.w |
Source: lsass.exe, 00000031.00000002.2659566774.000001BA8DA8B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1407822225.000001BA8DA89000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 00000031.00000000.1409136630.000001BA8E23D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2700477885.000001BA8E23D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000000.1619903394.000001F22BA13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000000.1620429839.000001F22BA41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000000.1622306834.000001F22BACB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: svchost.exe, 0000006F.00000000.1620180473.000001F22BA2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabe.com749 |
Source: svchost.exe, 0000006F.00000000.1621428719.000001F22BA8C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000000.1623512155.000001F22C314000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab |
Source: svchost.exe, 0000006F.00000000.1622306834.000001F22BACB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000000.1621145967.000001F22BA7B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab |
Source: svchost.exe, 0000006F.00000000.1621793217.000001F22BAA2000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000003.1650296288.000001F22BAC2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?3ff322c87bb41 |
Source: svchost.exe, 0000006F.00000000.1620180473.000001F22BA2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cabD9749 |
Source: lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: lsass.exe, 00000031.00000000.1407435054.000001BA8DA4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2630628617.000001BA8DA4F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: svchost.exe, 00000069.00000000.1575539204.000001B311C2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000069.00000002.2509671154.000001B311C2A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/update2/iqmnfy5ub2wrt6itb67uu4wcci_1.3.36.372/GoogleUpdate |
Source: svchost.exe, 00000058.00000000.1524557813.000002AB7F184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: svchost.exe, 0000006F.00000000.1621428719.000001F22BA8C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ |
Source: svchost.exe, 0000006F.00000000.1620429839.000001F22BA41000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uN |
Source: lsass.exe, 00000031.00000002.2736247539.000001BA8E3E1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409136630.000001BA8E23D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409782436.000001BA8E3CB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2692346869.000001BA8E220000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E29B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E29E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2700477885.000001BA8E283000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2713705631.000001BA8E297000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1409358052.000001BA8E28A000.00000004.00000001.00020000.00000000.sdmp, OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 00000031.00000002.2692346869.000001BA8E220000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0H |
Source: OfficeClickToRun.exe, 00000074.00000000.1742941039.000001570E118000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.microsoft.co |
Source: lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: lsass.exe, 00000031.00000000.1407435054.000001BA8DA4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000002.2630628617.000001BA8DA4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties |
Source: lsass.exe, 00000031.00000000.1407322100.000001BA8DA2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: svchost.exe, 0000000C.00000002.2617581393.000001560191C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2549220187.0000015601085000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://standards.iso.org/iso/19770/-2/2009/schema.xsd |
Source: svchost.exe, 00000006.00000002.1370890183.0000022ADE613000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.bingmapsportal.comc |
Source: lsass.exe, 00000031.00000002.2692346869.000001BA8E220000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000031.00000000.1408938613.000001BA8E200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: svchost.exe, 00000061.00000000.1548580428.000001D50025A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.msftconnecttest.com/ |
Source: dialer.exe, 00000051.00000002.2453295770.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://172.94.1q |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1371055435.0000022ADE65C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/ |
Source: svchost.exe, 00000006.00000003.1370106910.0000022ADE665000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1371073026.0000022ADE675000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370267523.0000022ADE65D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370421200.0000022ADE668000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370296542.0000022ADE644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370002682.0000022ADE671000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000006.00000002.1371073026.0000022ADE677000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370002682.0000022ADE671000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/ |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 00000006.00000003.1370089560.0000022ADE66A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 00000006.00000003.1369934811.0000022ADE678000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/ |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 00000006.00000003.1370106910.0000022ADE665000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370267523.0000022ADE65D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370421200.0000022ADE668000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations |
Source: svchost.exe, 00000006.00000003.1370089560.0000022ADE66A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1370947987.0000022ADE62B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 00000006.00000003.1370106910.0000022ADE665000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370421200.0000022ADE668000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1370947987.0000022ADE62B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/ |
Source: svchost.exe, 00000006.00000002.1371017605.0000022ADE647000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 00000006.00000003.1370106910.0000022ADE665000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370296542.0000022ADE644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 00000006.00000003.1370376221.0000022ADE632000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370106910.0000022ADE665000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370106910.0000022ADE665000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370296542.0000022ADE644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1370947987.0000022ADE62B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370296542.0000022ADE649000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 00000006.00000003.1370089560.0000022ADE66A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1370947987.0000022ADE62B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: OfficeClickToRun.exe, 00000074.00000002.2761215419.000001570C208000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ecs.office.com |
Source: svchost.exe, 0000006B.00000000.1592264170.00000184E25FB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006B.00000002.2709297650.00000184E25FD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006B.00000000.1604978379.00000184E2C40000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.com |
Source: svchost.exe, 0000006B.00000000.1606710274.00000184E2D4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.comSRD1% |
Source: svchost.exe, 00000058.00000000.1524557813.000002AB7F184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/Prod |
Source: svchost.exe, 00000002.00000003.1203500301.0000016358DD3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/Prod-C: |
Source: svchost.exe, 00000058.00000000.1524557813.000002AB7F184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/ProdC: |
Source: svchost.exe, 00000058.00000000.1524557813.000002AB7F184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2 |
Source: svchost.exe, 00000002.00000003.1203500301.0000016358DC2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C: |
Source: svchost.exe, 00000058.00000000.1524557813.000002AB7F184000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2C: |
Source: OfficeClickToRun.exe, 00000074.00000002.2678502917.000001570BEA8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d |
Source: OfficeClickToRun.exe, 00000074.00000002.2678502917.000001570BEA8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1652CE |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorize19g |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizeation |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorized |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizedty |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizeened( |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizeger |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizeltip |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizen |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizenies |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizeoggerp |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizeols |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizeoxy2 |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizespacex |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.windows.net/common/oauth2/authorizetos8 |
Source: svchost.exe, 0000006B.00000000.1602961959.00000184E2AFF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006B.00000000.1606710274.00000184E2D4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.comSRD1- |
Source: OfficeClickToRun.exe, 00000074.00000000.1700658907.000001570B606000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities |
Source: svchost.exe, 0000006B.00000000.1599616250.00000184E28CD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.com |
Source: svchost.exe, 0000006B.00000000.1599616250.00000184E28CD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comN |
Source: svchost.exe, 0000006B.00000000.1602961959.00000184E2AFF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006B.00000000.1605347716.00000184E2C79000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006B.00000000.1606710274.00000184E2D4E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006B.00000000.1605693530.00000184E2CFA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comSRD13 |
Source: svchost.exe, 00000006.00000003.1370296542.0000022ADE644000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370142823.0000022ADE642000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 00000006.00000003.1370218647.0000022ADE65B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1371055435.0000022ADE65C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north= |
Source: svchost.exe, 00000058.00000000.1519460664.000002AB7DE12000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAAAYHqKf08ZPoZ860Y%2foGt%2fNxdm9wovwzD08hc8iwriUJ1DW |
Source: svchost.exe, 0000006B.00000000.1602961959.00000184E2AFF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006B.00000000.1606710274.00000184E2D4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.comSRD1# |
Source: dialer.exe, 00000051.00000002.2453295770.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: pcacli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: moshost.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mapsbtsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mosstorage.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ztrace_maps.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ztrace_maps.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mapconfiguration.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: aphostservice.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: networkhelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userdataplatformhelperutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mccspal.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: syncutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: syncutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dmcfgutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dmcmnutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dmxmlhelputils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: inproclogger.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: windows.networking.connectivity.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: synccontroller.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pimstore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: aphostclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: accountaccessor.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: systemeventsbrokerclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userdatalanguageutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mccsengineshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pimstore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cemapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userdatatypehelperutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: phoneutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: storsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fltlib.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bcd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wer.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: storageusage.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usosvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: updatepolicy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: upshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usocoreps.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usoapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: napinsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wshbth.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: nlaapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: winrnr.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: mpclient.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: secur32.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: sspicli.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: version.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: msasn1.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: userenv.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: gpapi.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: wbemcomn.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: amsi.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: profapi.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: wscapi.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: urlmon.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: iertutil.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: srvcli.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: netutils.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: slc.dll | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Section loaded: sppc.dll | |
Source: unknown | Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS | |
Source: unknown | Process created: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe "C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe" | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Process "C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe" -Verb runAs | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p | |
Source: unknown | Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe "C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe" | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "SXJAJUSN" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "SXJAJUSN" binpath= "C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe" start= "auto" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "SXJAJUSN" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\dialer.exe dialer.exe | |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Process "C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe" -Verb runAs | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "SXJAJUSN" | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "SXJAJUSN" binpath= "C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe" start= "auto" | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zip\Setup.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "SXJAJUSN" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\ProgramData\guqotihtvufx\jnxsifnrdetl.exe | Process created: C:\Windows\System32\dialer.exe dialer.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Program Files\Windows Defender\MpCmdRun.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe TID: 3600 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 4596 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5824 | Thread sleep count: 6673 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5824 | Thread sleep count: 1172 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6380 | Thread sleep time: -2767011611056431s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5860 | Thread sleep time: -2767011611056431s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6608 | Thread sleep count: 330 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6608 | Thread sleep count: 7979 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6640 | Thread sleep time: -1844674407370954s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 2972 | Thread sleep count: 5536 > 30 | |
Source: C:\Windows\System32\winlogon.exe TID: 2972 | Thread sleep time: -5536000s >= -30000s | |
Source: C:\Windows\System32\winlogon.exe TID: 2972 | Thread sleep count: 4463 > 30 | |
Source: C:\Windows\System32\winlogon.exe TID: 2972 | Thread sleep time: -4463000s >= -30000s | |
Source: C:\Windows\System32\lsass.exe TID: 6616 | Thread sleep count: 9346 > 30 | |
Source: C:\Windows\System32\lsass.exe TID: 6616 | Thread sleep time: -9346000s >= -30000s | |
Source: C:\Windows\System32\lsass.exe TID: 6616 | Thread sleep count: 616 > 30 | |
Source: C:\Windows\System32\lsass.exe TID: 6616 | Thread sleep time: -616000s >= -30000s | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6576 | Thread sleep count: 732 > 30 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6576 | Thread sleep count: 8037 > 30 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6644 | Thread sleep time: -922337203685477s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6636 | Thread sleep count: 9251 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6636 | Thread sleep time: -9251000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6636 | Thread sleep count: 739 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6636 | Thread sleep time: -739000s >= -30000s | |
Source: C:\Windows\System32\dwm.exe TID: 2212 | Thread sleep count: 9868 > 30 | |
Source: C:\Windows\System32\dwm.exe TID: 2212 | Thread sleep time: -9868000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 7140 | Thread sleep count: 1267 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 7140 | Thread sleep time: -1267000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1640 | Thread sleep count: 1189 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1640 | Thread sleep time: -1189000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6452 | Thread sleep count: 1135 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6452 | Thread sleep time: -1135000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6460 | Thread sleep count: 1100 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6460 | Thread sleep time: -1100000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 7104 | Thread sleep count: 1026 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 7104 | Thread sleep time: -1026000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6440 | Thread sleep count: 994 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6440 | Thread sleep time: -994000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1996 | Thread sleep count: 817 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1996 | Thread sleep time: -817000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3904 | Thread sleep count: 831 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3904 | Thread sleep time: -831000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3228 | Thread sleep count: 827 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3228 | Thread sleep time: -827000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5708 | Thread sleep count: 835 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5708 | Thread sleep time: -835000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5428 | Thread sleep count: 793 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5428 | Thread sleep time: -793000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3192 | Thread sleep count: 795 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3192 | Thread sleep time: -795000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1904 | Thread sleep count: 802 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1904 | Thread sleep time: -802000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1944 | Thread sleep count: 769 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1944 | Thread sleep time: -769000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2424 | Thread sleep count: 778 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2424 | Thread sleep time: -778000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1868 | Thread sleep count: 715 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1868 | Thread sleep time: -715000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5860 | Thread sleep count: 706 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5860 | Thread sleep time: -706000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5824 | Thread sleep count: 707 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5824 | Thread sleep time: -707000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2504 | Thread sleep count: 717 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2504 | Thread sleep time: -717000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2120 | Thread sleep count: 633 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2120 | Thread sleep time: -633000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2268 | Thread sleep count: 677 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2268 | Thread sleep time: -677000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2060 | Thread sleep count: 638 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2060 | Thread sleep time: -638000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2196 | Thread sleep count: 633 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2196 | Thread sleep time: -633000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2132 | Thread sleep count: 661 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2132 | Thread sleep time: -661000s >= -30000s | |
Source: C:\Windows\System32\spoolsv.exe TID: 2076 | Thread sleep count: 528 > 30 | |
Source: C:\Windows\System32\spoolsv.exe TID: 2076 | Thread sleep time: -528000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2272 | Thread sleep count: 513 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2272 | Thread sleep time: -513000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5388 | Thread sleep count: 540 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5388 | Thread sleep time: -540000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6436 | Thread sleep count: 501 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6436 | Thread sleep time: -501000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 4180 | Thread sleep count: 492 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 4180 | Thread sleep time: -492000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2280 | Thread sleep count: 475 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2280 | Thread sleep time: -475000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 4612 | Thread sleep count: 241 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 4612 | Thread sleep time: -241000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3068 | Thread sleep count: 317 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3068 | Thread sleep time: -317000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3652 | Thread sleep count: 279 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3652 | Thread sleep time: -279000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2228 | Thread sleep count: 276 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2228 | Thread sleep time: -276000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 4684 | Thread sleep count: 84 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 4684 | Thread sleep time: -84000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2840 | Thread sleep count: 83 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2840 | Thread sleep time: -83000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 980 | Thread sleep count: 79 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 980 | Thread sleep time: -79000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6484 | Thread sleep count: 77 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6484 | Thread sleep time: -77000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6476 | Thread sleep count: 75 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6476 | Thread sleep time: -75000s >= -30000s | |
Source: C:\Windows\System32\sihost.exe TID: 3476 | Thread sleep count: 67 > 30 | |
Source: C:\Windows\System32\sihost.exe TID: 3476 | Thread sleep time: -67000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5556 | Thread sleep count: 64 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5556 | Thread sleep time: -64000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1552 | Thread sleep count: 59 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1552 | Thread sleep time: -59000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3196 | Thread sleep count: 55 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3196 | Thread sleep time: -55000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3956 | Thread sleep count: 57 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3956 | Thread sleep time: -57000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 4036 | Thread sleep count: 56 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 4036 | Thread sleep time: -56000s >= -30000s | |
Source: C:\Windows\System32\ctfmon.exe TID: 6596 | Thread sleep count: 54 > 30 | |
Source: C:\Windows\System32\ctfmon.exe TID: 6596 | Thread sleep time: -54000s >= -30000s | |
Source: C:\Windows\System32\dasHost.exe TID: 4152 | Thread sleep count: 50 > 30 | |
Source: C:\Windows\System32\dasHost.exe TID: 4152 | Thread sleep time: -50000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 4636 | Thread sleep count: 48 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 4636 | Thread sleep time: -48000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 4616 | Thread sleep count: 47 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 4616 | Thread sleep time: -47000s >= -30000s | |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\spoolsv.exe | Last function: Thread delayed |
Source: C:\Windows\System32\spoolsv.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\sihost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\sihost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\ctfmon.exe | Last function: Thread delayed |
Source: C:\Windows\System32\ctfmon.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dasHost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dasHost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\RuntimeBroker.exe | Last function: Thread delayed |
Source: C:\Windows\System32\RuntimeBroker.exe | Last function: Thread delayed |
Source: C:\Windows\System32\RuntimeBroker.exe | Last function: Thread delayed |
Source: C:\Windows\System32\RuntimeBroker.exe | Last function: Thread delayed |
Source: svchost.exe, 00000070.00000000.1633069505.00000177808D7000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityVMware VMCI Bus Device{4d36e97d-e325-11ce-bfc1-08002be10318}System.String[]Win32_PnPEntityVMware VMCI Bus DevicePCI\L5GLB1OV&DEV_0740&SUBSYS_074015AD&REV_10\3&61AAA01&0&3FSystem.String[]VMware, Inc.VMware VMCI Bus DeviceSystemPCI\ZA2OC8U6&DEV_0740&SUBSYS_074015AD&REV_10\3&61AAA01&0&3FvmciOKWin32_ComputerSystemuser-PCBCAAEBA95E435CA5300A680BE9BF735F04A93ECECD18F46C56865C6158D43B74 |
Source: svchost.exe, 00000070.00000000.1631379586.000001778084D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityMicrosoft Hyper-V Virtualization Infrastructure Driver{4d36e97d-e325-11ce-bfc1-08002be10318}Win32_PnPEntityMicrosoft Hyper-V Virtualization Infrastructure DriverROOT\VID\0000System.String[]MicrosoftMicrosoft Hyper-V Virtualization Infrastructure DriverSystemROOT\VID\0000VidOKWin32_ComputerSystemuser-PCBCAAEBA95E435CA5300A680BE9BF735F04A93ECECD18F46C56865C6158D43B74m |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DiskVMware__ |
Source: svchost.exe, 00000058.00000000.1501914715.000002AB7CC43000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@vmci |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntitySCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware SATA CD00 |
Source: svchost.exe, 00000056.00000000.1485322322.0000029BC7A2B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NECVMWarVMware SATA CD00 |
Source: svchost.exe, 00000070.00000003.1934284685.00000177815E2000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware, |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a |
Source: svchost.exe, 00000002.00000002.1398660296.000001635905D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1397704163.000001635383F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1398746540.0000016359062000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000051.00000002.2736429489.00000237CEF51000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000006D.00000000.1614000316.0000028F03640000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006D.00000000.1615387516.0000028F03F00000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000000.1621428719.000001F22BA8C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000000.1623246902.000001F22C307000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000006F.00000003.1650628550.000001F22C309000.00000004.00000001.00020000.00000000.sdmp, OfficeClickToRun.exe, 00000074.00000000.1698828870.000001570B559000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000070.00000000.1649347225.0000017781213000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntitySCSI\DISK&VEN_LZ4ZTPLC&PROD_VIRTUAL_DISK\4&1656F219&0&000000VMware Virtual disk SCSI Disk DeviceWin32_ComputerSystemuser-PC(Standard disk drives)SCSI\DISK&VEN_U3GCMCE2&PROD_VIRTUAL_DISK\4&1656F219&0&000000VMware Virtual disk SCSI Disk DeviceSystem.String[]System.String[]disk{4d36e967-e325-11ce-bfc1-08002be10318}Disk driveWin32_PnPEntityOKDiskDriveWin32_PnPEntity |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DiskSCSI\RAW(Standard disk drives){4d36e967-e325-11ce-bfc1-08002be10318}DiskDrivediskSCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000Win32_ComputerSystemWin32_PnPEntityuser-PCDisk driveOKVMware Virtual disk SCSI Disk DeviceVMware Virtual disk SCSI Disk Device |
Source: svchost.exe, 00000068.00000000.1573751858.0000014DE2102000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000058.00000000.1525438710.000002AB7F200000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS |
Source: svchost.exe, 00000058.00000000.1509946822.000002AB7D800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap |
Source: svchost.exe, 00000058.00000000.1524317200.000002AB7F153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value) |
Source: dwm.exe, 00000039.00000000.1421438028.0000028F87CBB000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: svchost.exe, 00000058.00000000.1502549095.000002AB7CC93000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMCI: Using capabilities (0x1c). |
Source: svchost.exe, 0000000A.00000002.2516685763.0000025C04A2B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: &@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000068.00000002.2515892556.0000014DE2036000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}1e |
Source: svchost.exe, 00000070.00000003.1915578900.00000177818B3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: stringComputer System ProductComputer System ProductTYVGCC0CC82742-52E4-CC1D-A08F-D3A4823E8F04VMware, Inc.None |
Source: svchost.exe, 0000000A.00000002.2555931604.0000025C04A7C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} |
Source: OfficeClickToRun.exe, 00000074.00000002.2726358341.000001570C0D2000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: appv:SoftwareClients/appv:JavaVirtualMachine) |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: nonicNECVMWarVMware SATA CD00 |
Source: svchost.exe, 00000058.00000000.1509946822.000002AB7D800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@ |
Source: svchost.exe, 00000058.00000000.1507183605.000002AB7D6CC000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmcir:m |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: nonicVMware Virtual disk 6000c29cbcceb42671d1430c5a2a776c |
Source: svchost.exe, 00000058.00000000.1525438710.000002AB7F200000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware Virtual disk 2.0 6000c29cbcceb42671d1430c5a2a776cPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS |
Source: svchost.exe, 00000058.00000000.1509946822.000002AB7D812000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk2.06000c29cbcceb42671d1430c5a2a776cPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00 |
Source: svchost.exe, 00000068.00000000.1572890773.0000014DE202B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000070.00000000.1665419098.0000017781800000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000070.00000000.1658423819.00000177814CA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000070.00000000.1635401063.00000177809CD000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: svchost.exe, 00000070.00000000.1649347225.0000017781213000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: svchost.exe, 00000070.00000000.1649347225.0000017781213000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: svchost.exe, 00000070.00000000.1635401063.00000177809CD000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityMicrosoft Hyper-V Generation Counter{4d36e97d-e325-11ce-bfc1-08002be10318}System.String[]Win32_PnPEntityMicrosoft Hyper-V Generation CounterACPI\VMW0001\7System.String[]MicrosoftMicrosoft Hyper-V Generation CounterSystemACPI\VMW0001\7gencounterOKWin32_ComputerSystemuser-PCBCAAEBA95E435CA5300A680BE9BF735F04A93ECECD18F46C56865C6158D43B74f |
Source: svchost.exe, 00000070.00000000.1631379586.000001778084D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000070.00000000.1666097721.00000177818B6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: svchost.exe, 00000058.00000000.1524317200.000002AB7F153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD')) |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D6DD000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: dowvmci |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: svchost.exe, 00000070.00000002.2809444149.00000177815B6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware VMCI Bus Device |
Source: svchost.exe, 00000070.00000000.1666097721.00000177818B6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityPCI\ZA2OC8U6&DEV_0740&SUBSYS_074015AD&REV_10\3&61AAA01&0&3FVMware VMCI Bus DeviceWin32_ComputerSystemuser-PCVMware, Inc.PCI\L5GLB1OV&DEV_0740&SUBSYS_074015AD&REV_10\3&61AAA01&0&3FVMware VMCI Bus DeviceSystem.String[]System.String[]vmci{4d36e97d-e325-11ce-bfc1-08002be10318}VMware VMCI Bus DeviceWin32_PnPEntityOKSystemWin32_PnPEntity |
Source: svchost.exe, 00000058.00000000.1501606126.000002AB7CC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000058.00000002.2553811851.000002AB7CC31000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @Microsoft-Windows-Hyper-V-Hypervisoron |
Source: svchost.exe, 00000058.00000000.1519460664.000002AB7DE12000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect> |
Source: svchost.exe, 00000070.00000000.1666097721.00000177818B6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityROOT\VID\0000Microsoft Hyper-V Virtualization Infrastructure DriverWin32_ComputerSystemuser-PCMicrosoftROOT\VID\0000Microsoft Hyper-V Virtualization Infrastructure DriverSystem.String[]Vid{4d36e97d-e325-11ce-bfc1-08002be10318}Microsoft Hyper-V Virtualization Infrastructure DriverWin32_PnPEntityOKSystemWin32_PnPEntity |
Source: svchost.exe, 0000000A.00000002.2516685763.0000025C04A2B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: @\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\ |
Source: dialer.exe, 00000051.00000002.2736429489.00000237CEEF8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW`j |
Source: svchost.exe, 0000000A.00000002.2528081013.0000025C04A4C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: #Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}st |
Source: svchost.exe, 00000058.00000000.1524317200.000002AB7F153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter')) |
Source: svchost.exe, 00000068.00000000.1573751858.0000014DE2102000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000068.00000002.2515892556.0000014DE2036000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000,@ |
Source: svchost.exe, 00000068.00000000.1572890773.0000014DE202B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: LSI_SASVMware Virtual disk 6000c29cbcceb42671d1430c5a2a776c |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DiskVMware__Virtual_disk____2.0_SCSI\DiskVMware__Virtual_disk____SCSI\DiskVMware__SCSI\VMware__Virtual_disk____2VMware__Virtual_disk____2GenDisk |
Source: svchost.exe, 00000068.00000000.1573105114.0000014DE2040000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "@SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware__Virtual_disk____2 |
Source: lsass.exe, 00000031.00000000.1407822225.000001BA8DA89000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicvssNT SERVICE |
Source: svchost.exe, 0000000A.00000002.2528081013.0000025C04A4C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: olume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D: @ |
Source: svchost.exe, 00000070.00000003.1915578900.00000177818B3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware, Inc. |
Source: svchost.exe, 0000000A.00000002.2555931604.0000025C04A81000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000070.00000000.1631379586.000001778084D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityNECVMWar VMware SATA CD00{4d36e965-e325-11ce-bfc1-08002be10318}System.String[]Win32_PnPEntityCD-ROM DriveSCSI\CDROM&VEN_NECVMWAR&PROD_S39LE_9U_SATA_CD00\4&224F42EF&0&000000System.String[](Standard CD-ROM drives)NECVMWar VMware SATA CD00CDROMSCSI\CDROM&VEN_NECVMWAR&PROD_DWR7T7SL_SATA_CD00\4&224F42EF&0&000000cdromOKWin32_ComputerSystemuser-PCBCAAEBA95E435CA5300A680BE9BF735F04A93ECECD18F46C56865C6158D43B74 |
Source: svchost.exe, 00000068.00000000.1572890773.0000014DE202B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000068.00000000.1573105114.0000014DE2040000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: svchost.exe, 00000070.00000000.1679265456.00000177FFEB1000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware(@ |
Source: svchost.exe, 00000070.00000002.2809444149.00000177815B6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: PCI\VEN_15AD&DEV_0740&REV_10PCI\VEN_15AD&DEV_0740PCI\VEN_15AD&CC_088000PCI\VEN_15AD&CC_0880PCI\VEN_15ADPCI\CC_088000PCI\CC_0880VMware, Inc.{4d36e97d-e325-11ce-bfc1-08002be10318}SystemvmciPCI\VEN_15AD&DEV_0740&SUBSYS_074015AD&REV_10\3&61AAA01&0&3FWin32_ComputerSystemWin32_PnPEntityuser-PCVMware VMCI Bus DeviceOKVMware VMCI Bus DeviceVMware VMCI Bus Device |
Source: svchost.exe, 00000058.00000000.1509946822.000002AB7D800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8 |
Source: OfficeClickToRun.exe, 00000074.00000000.1769933033.000001570EDC5000.00000004.00000001.00020000.00000000.sdmp, OfficeClickToRun.exe, 00000074.00000000.1732873071.000001570D70C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: JavaVirtualMachine |
Source: svchost.exe, 00000058.00000000.1509946822.000002AB7D812000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00 |
Source: svchost.exe, 0000000A.00000002.2555931604.0000025C04A65000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: storahciNECVMWarVMware SATA CD00 |
Source: svchost.exe, 00000070.00000000.1633069505.00000177808D7000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityVMware Virtual disk SCSI Disk Device{4d36e967-e325-11ce-bfc1-08002be10318}System.String[]Win32_PnPEntityDisk driveSCSI\DISK&VEN_U3GCMCE2&PROD_VIRTUAL_DISK\4&1656F219&0&000000System.String[](Standard disk drives)VMware Virtual disk SCSI Disk DeviceDiskDriveSCSI\DISK&VEN_LZ4ZTPLC&PROD_VIRTUAL_DISK\4&1656F219&0&000000diskOKWin32_ComputerSystemuser-PCBCAAEBA95E435CA5300A680BE9BF735F04A93ECECD18F46C56865C6158D43B74 |
Source: lsass.exe, 00000031.00000000.1407209712.000001BA8DA13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000038.00000000.1413891488.0000012E36413000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000053.00000000.1477366927.000001B3B942B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000054.00000000.1479752162.0000023368624000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000056.00000000.1485614982.0000029BC7A52000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000058.00000000.1501914715.000002AB7CC43000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000005D.00000000.1537778471.000001C25522B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000005E.00000000.1540169933.00000171ACC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000061.00000000.1548378383.000001D50022B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000063.00000000.1557193891.000001EAC5C53000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000065.00000000.1565116913.0000015221659000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DiskVMware__Virtual_disk____ |
Source: lsass.exe, 00000031.00000000.1407822225.000001BA8DA89000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicshutdownNT SERVICE |
Source: svchost.exe, 00000058.00000000.1509946822.000002AB7D800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: RVMwareVirtual disk6000c29cbcceb42671d1430c5a2a776c8 |
Source: svchost.exe, 00000068.00000000.1573512373.0000014DE206A000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: UDFBBSCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: svchost.exe, 00000068.00000002.2538587150.0000014DE2046000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000HD |
Source: svchost.exe, 00000068.00000000.1572890773.0000014DE202B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DiskVMware__Virtual_disk____2.0_ |
Source: svchost.exe, 00000058.00000000.1524317200.000002AB7F153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value) |
Source: svchost.exe, 00000038.00000003.1564486065.0000012E3646E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: svchost.exe, 00000068.00000000.1572890773.0000014DE202B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: "@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: svchost.exe, 00000071.00000000.1684040204.000001647AE02000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc |
Source: lsass.exe, 00000031.00000000.1407822225.000001BA8DA89000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicheartbeatNT SERVICE |
Source: dialer.exe, 00000051.00000002.2736429489.00000237CEF51000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW=h |
Source: svchost.exe, 00000070.00000000.1665419098.0000017781800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: ACPI\VM_Gen_CounterVM_Gen_Counter*PNP0C02Microsoft{4d36e97d-e325-11ce-bfc1-08002be10318}SystemgencounterACPI\VMW0001\7Win32_ComputerSystemWin32_PnPEntityuser-PCMicrosoft Hyper-V Generation CounterOKMicrosoft Hyper-V Generation CounterMicrosoft Hyper-V Generation Counter |
Source: svchost.exe, 0000006D.00000000.1614000316.0000028F03640000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWws\System32\en-US\wshqos.dll.mui |
Source: svchost.exe, 00000058.00000000.1507761622.000002AB7D720000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: nonicVMware Virtual disk 6000c29cbcceb42671d1430c5a2a776cce |
Source: svchost.exe, 00000058.00000000.1509946822.000002AB7D800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: RVMwareVirtual disk6000c29cbcceb42671d1430c5a2a776c0 |
Source: svchost.exe, 00000070.00000000.1649347225.0000017781213000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntitySCSI\CDROM&VEN_NECVMWAR&PROD_DWR7T7SL_SATA_CD00\4&224F42EF&0&000000NECVMWar VMware SATA CD00Win32_ComputerSystemuser-PC(Standard CD-ROM drives)SCSI\CDROM&VEN_NECVMWAR&PROD_S39LE_9U_SATA_CD00\4&224F42EF&0&000000NECVMWar VMware SATA CD00System.String[]System.String[]cdrom{4d36e965-e325-11ce-bfc1-08002be10318}CD-ROM DriveWin32_PnPEntityOKCDROMWin32_PnPEntity |
Source: svchost.exe, 00000058.00000000.1524317200.000002AB7F153000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware')) |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: svchost.exe, 00000070.00000000.1658423819.00000177814CA000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Win32_PnPEntityACPI\VMW0001\7Microsoft Hyper-V Generation CounterWin32_ComputerSystemuser-PCMicrosoftACPI\VMW0001\7Microsoft Hyper-V Generation CounterSystem.String[]System.String[]gencounter{4d36e97d-e325-11ce-bfc1-08002be10318}Microsoft Hyper-V Generation CounterWin32_PnPEntityOKSystemWin32_PnPEntity |
Source: svchost.exe, 00000070.00000000.1661196455.0000017781590000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\VMware__Virtual_disk____2 |
Source: svchost.exe, 00000070.00000000.1679265456.00000177FFEB1000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NoneVMware(@ |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 1C8F78F0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 1BA8E920000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 12E36FA0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 28F8AE40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 1C8F7960000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 1BA8E980000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 12E37000000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 28F8AE70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22C35FA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1B3B9390000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23368CB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28B68F30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 29BC8180000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 29D50F40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2AB7D2C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1E9297D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A183790000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D564190000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1CF6D790000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1C2551B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 171ACBC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 283C6530000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1FF39B80000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D500190000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 257B5780000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1EAC63D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 20428C60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 15222280000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 16D24BB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 163535B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 14DE2730000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1B3122B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\spoolsv.exe base: 7A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 184E1BC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 211FEB70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28F03C70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F3D2900000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F22EB90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 17780D60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1647B460000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 224D0D90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1B924FB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1570D1F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1879E9D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 197DB9C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1DF6FFB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 229F9BD0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1392A290000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\sihost.exe base: 177AD190000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 227FBAE0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 20620920000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 27AAC950000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 167425D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 234F1060000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ctfmon.exe base: 1A0BCB20000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dasHost.exe base: 28092350000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1586A4D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2E523130000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\explorer.exe base: 2530000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22D497A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 22AAA920000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1FEFBE50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1F044E50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 26AF0680000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\winlogon.exe EIP: F78F273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\lsass.exe EIP: 8E92273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 36FA273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F796273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8E98273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 3700273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8AE7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 35FA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: B939273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 68CB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 68F3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: C818273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 50F4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 7D2C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 297D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 8379273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 6419273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 6D79273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 551B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: ACBC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: C653273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 39B8273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 19273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: B578273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: C63D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 28C6273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 2228273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 24BB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 535B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: E273273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 122B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\spoolsv.exe EIP: 7A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: E1BC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: FEB7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 3C7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: D290273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 2EB9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 80D6273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 7B46273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: D0D9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 24FB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe EIP: D1F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 9E9D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: DB9C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 6FFB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: F9BD273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 2A29273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\sihost.exe EIP: AD19273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: FBAE273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 2092273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: AC95273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 425D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: F106273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\ctfmon.exe EIP: BCB2273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\dasHost.exe EIP: 9235273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 6A4D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 2313273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\explorer.exe EIP: 253273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 497A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: AA92273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: FBE5273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\RuntimeBroker.exe EIP: 44E5273C | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1C8F78F0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 1BA8E920000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 12E36FA0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 28F8AE40000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1C8F7960000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 1BA8E980000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 12E37000000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 28F8AE70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C35FA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B3B9390000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23368CB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28B68F30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 29BC8180000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 29D50F40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2AB7D2C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E9297D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A183790000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D564190000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CF6D790000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C2551B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 171ACBC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 283C6530000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FF39B80000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D500190000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257B5780000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1EAC63D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20428C60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15222280000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 16D24BB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 163535B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14DE2730000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B3122B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 7A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 184E1BC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 211FEB70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28F03C70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F3D2900000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F22EB90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17780D60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1647B460000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 224D0D90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B924FB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1570D1F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1879E9D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 197DB9C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DF6FFB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 229F9BD0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1392A290000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 177AD190000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 227FBAE0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20620920000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27AAC950000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 167425D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 234F1060000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 1A0BCB20000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 28092350000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1586A4D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2E523130000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 2530000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22D497A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 22AAA920000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1FEFBE50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1F044E50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 26AF0680000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1C8F78F0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 1BA8E920000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 12E36FA0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 28F8AE40000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\dwm.exe base: 28F8ADF0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1C8F7960000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 1BA8E980000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 12E37000000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 28F8AE70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C35FA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B3B9390000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23368CB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28B68F30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 29BC8180000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 29D50F40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2AB7D2C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E9297D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A183790000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D564190000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CF6D790000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C2551B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 171ACBC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 283C6530000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FF39B80000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D500190000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257B5780000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1EAC63D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20428C60000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15222280000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 16D24BB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 163535B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14DE2730000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B3122B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 7A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 184E1BC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 211FEB70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28F03C70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F3D2900000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F22EB90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17780D60000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1647B460000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 224D0D90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B924FB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1570D1F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1879E9D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 197DB9C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DF6FFB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 229F9BD0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1392A290000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 177AD190000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 227FBAE0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20620920000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27AAC950000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 167425D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 234F1060000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 1A0BCB20000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 28092350000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1586A4D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2E523130000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 2530000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22D497A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 22AAA920000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1FEFBE50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1F044E50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 26AF0680000 | |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C: VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C: VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C: VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | |