Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: d.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbcache source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6ACDCE0 FindFirstFileExW, | 4_2_000001B1C6ACDCE0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165EDCE0 FindFirstFileExW, | 17_2_000002D0165EDCE0 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F151DCE0 FindFirstFileExW, | 21_2_000002D6F151DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FDDCE0 FindFirstFileExW, | 22_2_0000014E41FDDCE0 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B04DCE0 FindFirstFileExW, | 23_2_000001D15B04DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32EDCE0 FindFirstFileExW, | 24_2_0000023AF32EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD9DCE0 FindFirstFileExW, | 25_2_0000023C9FD9DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA71DCE0 FindFirstFileExW, | 26_2_000001A1CA71DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE6DCE0 FindFirstFileExW, | 27_2_00000246EDE6DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19BDCE0 FindFirstFileExW, | 28_2_00000200A19BDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000002259668DCE0 FindFirstFileExW, | 29_2_000002259668DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670FDCE0 FindFirstFileExW, | 30_2_0000022E670FDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4EDCE0 FindFirstFileExW, | 31_2_000001FE4A4EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A7DCE0 FindFirstFileExW, | 32_2_0000024C19A7DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D266DCE0 FindFirstFileExW, | 33_2_00000275D266DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCCDCE0 FindFirstFileExW, | 34_2_0000023BBDCCDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D954DCE0 FindFirstFileExW, | 35_2_00000227D954DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2CADCE0 FindFirstFileExW, | 36_2_000002DED2CADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6EDCE0 FindFirstFileExW, | 37_2_0000014ACE6EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AF66DCE0 FindFirstFileExW, | 38_2_00000220AF66DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B697DCE0 FindFirstFileExW, | 39_2_00000241B697DCE0 |
Source: Microsoft-Windows-LiveId%4Operational.evtx.30.dr | String found in binary or memory: http://Passport.NET/tb |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~ |
Source: lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 00000015.00000000.2146568788.000002D6F0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C00000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: lsass.exe, 00000015.00000000.2146371271.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3388396962.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0H |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0I |
Source: lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: lsass.exe, 00000015.00000000.2146371271.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3388396962.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P |
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: svchost.exe, 00000029.00000000.2208243745.0000014D25483000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000002.3421210700.0000014D25483000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.msftconnecttest.com/ |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6A91F2C | 4_2_000001B1C6A91F2C |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6AA38A8 | 4_2_000001B1C6AA38A8 |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6A9D0E0 | 4_2_000001B1C6A9D0E0 |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6AC2B2C | 4_2_000001B1C6AC2B2C |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6AD44A8 | 4_2_000001B1C6AD44A8 |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6ACDCE0 | 4_2_000001B1C6ACDCE0 |
Source: C:\Windows\System32\dialer.exe | Code function: 12_2_00007FF6AFBE14D8 | 12_2_00007FF6AFBE14D8 |
Source: C:\Windows\System32\dialer.exe | Code function: 12_2_00007FF6AFBE226C | 12_2_00007FF6AFBE226C |
Source: C:\Windows\System32\dialer.exe | Code function: 12_2_00007FF6AFBE2560 | 12_2_00007FF6AFBE2560 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D016581F2C | 17_2_000002D016581F2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165938A8 | 17_2_000002D0165938A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D01658D0E0 | 17_2_000002D01658D0E0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165E2B2C | 17_2_000002D0165E2B2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165F44A8 | 17_2_000002D0165F44A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165EDCE0 | 17_2_000002D0165EDCE0 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F14ED0E0 | 21_2_000002D6F14ED0E0 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F14F38A8 | 21_2_000002D6F14F38A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F14E1F2C | 21_2_000002D6F14E1F2C |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F151DCE0 | 21_2_000002D6F151DCE0 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F15244A8 | 21_2_000002D6F15244A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F1512B2C | 21_2_000002D6F1512B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FAD0E0 | 22_2_0000014E41FAD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FB38A8 | 22_2_0000014E41FB38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FA1F2C | 22_2_0000014E41FA1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FDDCE0 | 22_2_0000014E41FDDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FE44A8 | 22_2_0000014E41FE44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FD2B2C | 22_2_0000014E41FD2B2C |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B011F2C | 23_2_000001D15B011F2C |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B01D0E0 | 23_2_000001D15B01D0E0 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B0238A8 | 23_2_000001D15B0238A8 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B042B2C | 23_2_000001D15B042B2C |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B04DCE0 | 23_2_000001D15B04DCE0 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B0544A8 | 23_2_000001D15B0544A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32C38A8 | 24_2_0000023AF32C38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32BD0E0 | 24_2_0000023AF32BD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32B1F2C | 24_2_0000023AF32B1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32F44A8 | 24_2_0000023AF32F44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32EDCE0 | 24_2_0000023AF32EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32E2B2C | 24_2_0000023AF32E2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD6D0E0 | 25_2_0000023C9FD6D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD738A8 | 25_2_0000023C9FD738A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD61F2C | 25_2_0000023C9FD61F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD9DCE0 | 25_2_0000023C9FD9DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FDA44A8 | 25_2_0000023C9FDA44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD92B2C | 25_2_0000023C9FD92B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA6ED0E0 | 26_2_000001A1CA6ED0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA6F38A8 | 26_2_000001A1CA6F38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA6E1F2C | 26_2_000001A1CA6E1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA71DCE0 | 26_2_000001A1CA71DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA7244A8 | 26_2_000001A1CA7244A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA712B2C | 26_2_000001A1CA712B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246ED7B1F2C | 27_2_00000246ED7B1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246ED7BD0E0 | 27_2_00000246ED7BD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246ED7C38A8 | 27_2_00000246ED7C38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE62B2C | 27_2_00000246EDE62B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE6DCE0 | 27_2_00000246EDE6DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE744A8 | 27_2_00000246EDE744A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19B2B2C | 28_2_00000200A19B2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19C44A8 | 28_2_00000200A19C44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19BDCE0 | 28_2_00000200A19BDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000002259668DCE0 | 29_2_000002259668DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_00000225966944A8 | 29_2_00000225966944A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_0000022596682B2C | 29_2_0000022596682B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670C1F2C | 30_2_0000022E670C1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670D38A8 | 30_2_0000022E670D38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670CD0E0 | 30_2_0000022E670CD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670F2B2C | 30_2_0000022E670F2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E671044A8 | 30_2_0000022E671044A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670FDCE0 | 30_2_0000022E670FDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4C38A8 | 31_2_000001FE4A4C38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4BD0E0 | 31_2_000001FE4A4BD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4B1F2C | 31_2_000001FE4A4B1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4F44A8 | 31_2_000001FE4A4F44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4EDCE0 | 31_2_000001FE4A4EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4E2B2C | 31_2_000001FE4A4E2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A4D0E0 | 32_2_0000024C19A4D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A538A8 | 32_2_0000024C19A538A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A41F2C | 32_2_0000024C19A41F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A7DCE0 | 32_2_0000024C19A7DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A844A8 | 32_2_0000024C19A844A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A72B2C | 32_2_0000024C19A72B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D1FCD0E0 | 33_2_00000275D1FCD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D1FD38A8 | 33_2_00000275D1FD38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D1FC1F2C | 33_2_00000275D1FC1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D2662B2C | 33_2_00000275D2662B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D26744A8 | 33_2_00000275D26744A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D266DCE0 | 33_2_00000275D266DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCA38A8 | 34_2_0000023BBDCA38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDC91F2C | 34_2_0000023BBDC91F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDC9D0E0 | 34_2_0000023BBDC9D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCD44A8 | 34_2_0000023BBDCD44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCC2B2C | 34_2_0000023BBDCC2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCCDCE0 | 34_2_0000023BBDCCDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D9542B2C | 35_2_00000227D9542B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D95544A8 | 35_2_00000227D95544A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D954DCE0 | 35_2_00000227D954DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2C71F2C | 36_2_000002DED2C71F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2C7D0E0 | 36_2_000002DED2C7D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2C838A8 | 36_2_000002DED2C838A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2CA2B2C | 36_2_000002DED2CA2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2CADCE0 | 36_2_000002DED2CADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2CB44A8 | 36_2_000002DED2CB44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6B1F2C | 37_2_0000014ACE6B1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6BD0E0 | 37_2_0000014ACE6BD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6C38A8 | 37_2_0000014ACE6C38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6E2B2C | 37_2_0000014ACE6E2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6EDCE0 | 37_2_0000014ACE6EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6F44A8 | 37_2_0000014ACE6F44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AEFDD0E0 | 38_2_00000220AEFDD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AEFE38A8 | 38_2_00000220AEFE38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AEFD1F2C | 38_2_00000220AEFD1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AF66DCE0 | 38_2_00000220AF66DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AF6744A8 | 38_2_00000220AF6744A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AF662B2C | 38_2_00000220AF662B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B69538A8 | 39_2_00000241B69538A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B694D0E0 | 39_2_00000241B694D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B6941F2C | 39_2_00000241B6941F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B69844A8 | 39_2_00000241B69844A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B697DCE0 | 39_2_00000241B697DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B6972B2C | 39_2_00000241B6972B2C |
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.30.dr | Binary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}( |
Source: System.evtx.30.dr | Binary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe` |
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.dr | Binary string: \Device\NetbiosSmb |
Source: System.evtx.30.dr | Binary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4lt |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.dr | Binary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: System.evtx.30.dr | Binary string: C:\Device\HarddiskVolume3`& |
Source: System.evtx.30.dr | Binary string: C:\Device\HarddiskVolume3 |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.dr | Binary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeP** |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.dr | Binary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: Security.evtx.30.dr | Binary string: \Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys |
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.30.dr | Binary string: 4\Device\HarddiskVolume3\Windows\System32\spoolsv.exe |
Source: Security.evtx.30.dr | Binary string: \Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sysnvi |
Source: System.evtx.30.dr | Binary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.dr | Binary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1} |
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.dr | Binary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1} |
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.dr | Binary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1} |
Source: System.evtx.30.dr | Binary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4A |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.dr | Binary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.dr | Binary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.dr | Binary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1} |
Source: unknown | Process created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe" | |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding | |
Source: unknown | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop UsoSvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop wuauserv | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop bits | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop dosvc | |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe | |
Source: unknown | Process created: C:\Program Files\Google\Chrome\updater.exe "C:\Program Files\Google\Chrome\updater.exe" | |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop UsoSvc | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop wuauserv | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop bits | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop dosvc | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: fastprox.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: ncobjapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mpclient.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wmitomi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: d.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbcache source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6AAACDD push rcx; retf 003Fh | 4_2_000001B1C6AAACDE |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6ADC6DD push rcx; retf 003Fh | 4_2_000001B1C6ADC6DE |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D01659ACDD push rcx; retf 003Fh | 17_2_000002D01659ACDE |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165FC6DD push rcx; retf 003Fh | 17_2_000002D0165FC6DE |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F14FACDD push rcx; retf 003Fh | 21_2_000002D6F14FACDE |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F152C6DD push rcx; retf 003Fh | 21_2_000002D6F152C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FBACDD push rcx; retf 003Fh | 22_2_0000014E41FBACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FEC6DD push rcx; retf 003Fh | 22_2_0000014E41FEC6DE |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B02ACDD push rcx; retf 003Fh | 23_2_000001D15B02ACDE |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B05C6DD push rcx; retf 003Fh | 23_2_000001D15B05C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32CACDD push rcx; retf 003Fh | 24_2_0000023AF32CACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD7ACDD push rcx; retf 003Fh | 25_2_0000023C9FD7ACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FDAC6DD push rcx; retf 003Fh | 25_2_0000023C9FDAC6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA6FACDD push rcx; retf 003Fh | 26_2_000001A1CA6FACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA72C6DD push rcx; retf 003Fh | 26_2_000001A1CA72C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246ED7CACDD push rcx; retf 003Fh | 27_2_00000246ED7CACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE7C6DD push rcx; retf 003Fh | 27_2_00000246EDE7C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19CC6DD push rcx; retf 003Fh | 28_2_00000200A19CC6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000002259669C6DD push rcx; retf 003Fh | 29_2_000002259669C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670DACDD push rcx; retf 003Fh | 30_2_0000022E670DACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E6710C6DD push rcx; retf 003Fh | 30_2_0000022E6710C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4CACDD push rcx; retf 003Fh | 31_2_000001FE4A4CACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4FC6DD push rcx; retf 003Fh | 31_2_000001FE4A4FC6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A5ACDD push rcx; retf 003Fh | 32_2_0000024C19A5ACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A8C6DD push rcx; retf 003Fh | 32_2_0000024C19A8C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D1FDACDD push rcx; retf 003Fh | 33_2_00000275D1FDACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D267C6DD push rcx; retf 003Fh | 33_2_00000275D267C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCAACDD push rcx; retf 003Fh | 34_2_0000023BBDCAACDE |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCDC6DD push rcx; retf 003Fh | 34_2_0000023BBDCDC6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D955C6DD push rcx; retf 003Fh | 35_2_00000227D955C6DE |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2C8ACDD push rcx; retf 003Fh | 36_2_000002DED2C8ACDE |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2548 | Thread sleep count: 5145 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5660 | Thread sleep count: 4745 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5476 | Thread sleep time: -7378697629483816s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5660 | Thread sleep count: 252 > 30 | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5660 | Thread sleep time: -252000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\dialer.exe TID: 3544 | Thread sleep count: 1711 > 30 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe TID: 3544 | Thread sleep time: -171100s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\dialer.exe TID: 1008 | Thread sleep count: 657 > 30 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe TID: 1008 | Thread sleep time: -65700s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 2820 | Thread sleep count: 6588 > 30 | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 2820 | Thread sleep time: -6588000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 2820 | Thread sleep count: 3412 > 30 | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 2820 | Thread sleep time: -3412000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\lsass.exe TID: 3800 | Thread sleep count: 8026 > 30 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe TID: 3800 | Thread sleep time: -8026000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\lsass.exe TID: 3800 | Thread sleep count: 1903 > 30 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe TID: 3800 | Thread sleep time: -1903000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 1584 | Thread sleep count: 245 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 1584 | Thread sleep time: -245000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\dwm.exe TID: 1804 | Thread sleep count: 9864 > 30 | Jump to behavior |
Source: C:\Windows\System32\dwm.exe TID: 1804 | Thread sleep time: -9864000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 2268 | Thread sleep count: 255 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 2268 | Thread sleep time: -255000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6108 | Thread sleep count: 255 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6108 | Thread sleep time: -255000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 5476 | Thread sleep count: 244 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 5476 | Thread sleep time: -244000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6336 | Thread sleep count: 244 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6336 | Thread sleep time: -244000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 5960 | Thread sleep count: 203 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 5960 | Thread sleep time: -203000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 3472 | Thread sleep count: 254 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 3472 | Thread sleep time: -254000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6512 | Thread sleep count: 241 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6512 | Thread sleep time: -241000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 4208 | Thread sleep count: 248 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 4208 | Thread sleep time: -248000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6540 | Thread sleep count: 252 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6540 | Thread sleep time: -252000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 404 | Thread sleep count: 242 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 404 | Thread sleep time: -242000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 4044 | Thread sleep count: 255 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 4044 | Thread sleep time: -255000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 2896 | Thread sleep count: 255 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 2896 | Thread sleep time: -255000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 592 | Thread sleep count: 238 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 592 | Thread sleep time: -238000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 3700 | Thread sleep count: 255 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 3700 | Thread sleep time: -255000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 3816 | Thread sleep count: 252 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 3816 | Thread sleep time: -252000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 5696 | Thread sleep count: 256 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 5696 | Thread sleep time: -256000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 7008 | Thread sleep count: 256 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 7008 | Thread sleep time: -256000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 340 | Thread sleep count: 245 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 340 | Thread sleep time: -245000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 2620 | Thread sleep count: 200 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 2620 | Thread sleep time: -200000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6136 | Thread sleep count: 252 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6136 | Thread sleep time: -252000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 1052 | Thread sleep count: 239 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 1052 | Thread sleep time: -239000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6876 | Thread sleep count: 253 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 6876 | Thread sleep time: -253000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 4864 | Thread sleep count: 254 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 4864 | Thread sleep time: -254000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Last function: Thread delayed |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dwm.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dwm.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6ACDCE0 FindFirstFileExW, | 4_2_000001B1C6ACDCE0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165EDCE0 FindFirstFileExW, | 17_2_000002D0165EDCE0 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F151DCE0 FindFirstFileExW, | 21_2_000002D6F151DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FDDCE0 FindFirstFileExW, | 22_2_0000014E41FDDCE0 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B04DCE0 FindFirstFileExW, | 23_2_000001D15B04DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32EDCE0 FindFirstFileExW, | 24_2_0000023AF32EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD9DCE0 FindFirstFileExW, | 25_2_0000023C9FD9DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA71DCE0 FindFirstFileExW, | 26_2_000001A1CA71DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE6DCE0 FindFirstFileExW, | 27_2_00000246EDE6DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19BDCE0 FindFirstFileExW, | 28_2_00000200A19BDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000002259668DCE0 FindFirstFileExW, | 29_2_000002259668DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670FDCE0 FindFirstFileExW, | 30_2_0000022E670FDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4EDCE0 FindFirstFileExW, | 31_2_000001FE4A4EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A7DCE0 FindFirstFileExW, | 32_2_0000024C19A7DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D266DCE0 FindFirstFileExW, | 33_2_00000275D266DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCCDCE0 FindFirstFileExW, | 34_2_0000023BBDCCDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D954DCE0 FindFirstFileExW, | 35_2_00000227D954DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2CADCE0 FindFirstFileExW, | 36_2_000002DED2CADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6EDCE0 FindFirstFileExW, | 37_2_0000014ACE6EDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AF66DCE0 FindFirstFileExW, | 38_2_00000220AF66DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B697DCE0 FindFirstFileExW, | 39_2_00000241B697DCE0 |
Source: dwm.exe, 00000017.00000002.3428646036.000001D156AA0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000gB |
Source: svchost.exe, 0000001E.00000002.3400792914.0000022E66A2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000000.2182071509.0000022E66A2B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor |
Source: lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicvssNT SERVICE |
Source: svchost.exe, 0000001E.00000002.3401934481.0000022E66A43000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@vmci |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: VMware SATA CD00 |
Source: svchost.exe, 0000001C.00000002.3387853671.00000200A122B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: NECVMWarVMware SATA CD00 |
Source: svchost.exe, 0000001E.00000002.3407425356.0000022E67060000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: D8VMwareVirtual disk6000c29c2bea38880a8a16ee9f37bec9 |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a |
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8 |
Source: svchost.exe, 0000001E.00000003.2262517067.0000022E6759C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00 |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: storahciNECVMWarVMware SATA CD00 |
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.30.dr | Binary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS |
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.dr | Binary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value) |
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: D8VMwareVirtual disk6000c29c2bea38880a8a16ee9f37bec98 |
Source: lsass.exe, 00000015.00000002.3387178705.000002D6F0613000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146320539.000002D6F0613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.2148868592.0000014E41C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3382740118.0000014E41C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3385466857.0000023C9FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2168682482.0000023C9FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.3380926986.000001A1CA02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000000.2169895372.000001A1CA034000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000002.3388754633.00000200A1241000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000000.2174065757.00000200A1241000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000000.2182141150.0000022E66A43000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: LSI_SASVMware Virtual disk 6000c29c2bea38880a8a16ee9f37bec9 |
Source: svchost.exe, 00000016.00000002.3382740118.0000014E41C13000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: System.evtx.30.dr | Binary or memory string: VMCI: Using capabilities (0x1c). |
Source: lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicshutdownNT SERVICE |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.dr | Binary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value) |
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.30.dr | Binary or memory string: VMware Virtual disk 2.0 6000c29c2bea38880a8a16ee9f37bec9PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: nonicNECVMWarVMware SATA CD00 |
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@ |
Source: svchost.exe, 00000023.00000002.3380795225.00000227D882B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NXTVMWare |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.dr | Binary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value) |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a |
Source: svchost.exe, 00000028.00000000.2206212871.00000202A1C02000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc |
Source: svchost.exe, 0000001E.00000002.3414254414.0000022E6747B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmciAP< |
Source: lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicheartbeatNT SERVICE |
Source: svchost.exe, 0000001E.00000000.2183094778.0000022E6749C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: dowvmci |
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.30.dr | Binary or memory string: VMware |
Source: svchost.exe, 0000001E.00000000.2182457632.0000022E67080000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect> |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.dr | Binary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter')) |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.dr | Binary or memory string: nonicVMware Virtual disk 6000c29c2bea38880a8a16ee9f37bec9 |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.dr | Binary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware')) |
Source: dwm.exe, 00000017.00000002.3428646036.000001D156B0A000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: svchost.exe, 0000001E.00000002.3407425356.0000022E67060000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk2.06000c29c2bea38880a8a16ee9f37bec9PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00 |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.dr | Binary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD')) |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6ACD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 4_2_000001B1C6ACD2A4 |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Code function: 4_2_000001B1C6AC7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 4_2_000001B1C6AC7D90 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 17_2_000002D0165E7D90 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165F6218 SetUnhandledExceptionFilter, | 17_2_000002D0165F6218 |
Source: C:\Windows\System32\winlogon.exe | Code function: 17_2_000002D0165ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 17_2_000002D0165ED2A4 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F1517D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 21_2_000002D6F1517D90 |
Source: C:\Windows\System32\lsass.exe | Code function: 21_2_000002D6F151D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 21_2_000002D6F151D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FDD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 22_2_0000014E41FDD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 22_2_0000014E41FD7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 22_2_0000014E41FD7D90 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B056218 SetUnhandledExceptionFilter, | 23_2_000001D15B056218 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B04D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 23_2_000001D15B04D2A4 |
Source: C:\Windows\System32\dwm.exe | Code function: 23_2_000001D15B047D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 23_2_000001D15B047D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 24_2_0000023AF32ED2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 24_2_0000023AF32E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 24_2_0000023AF32E7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD9D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 25_2_0000023C9FD9D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 25_2_0000023C9FD97D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 25_2_0000023C9FD97D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA717D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 26_2_000001A1CA717D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 26_2_000001A1CA71D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 26_2_000001A1CA71D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE6D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 27_2_00000246EDE6D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 27_2_00000246EDE67D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 27_2_00000246EDE67D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19BD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 28_2_00000200A19BD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19C6218 SetUnhandledExceptionFilter, | 28_2_00000200A19C6218 |
Source: C:\Windows\System32\svchost.exe | Code function: 28_2_00000200A19B7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 28_2_00000200A19B7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_0000022596687D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 29_2_0000022596687D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 29_2_000002259668D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 29_2_000002259668D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670FD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_0000022E670FD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_0000022E670F7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_0000022E670F7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_000001FE4A4E7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 31_2_000001FE4A4ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_000001FE4A4ED2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A7D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 32_2_0000024C19A7D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 32_2_0000024C19A77D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 32_2_0000024C19A77D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D266D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 33_2_00000275D266D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 33_2_00000275D2667D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 33_2_00000275D2667D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCCD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 34_2_0000023BBDCCD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCD6218 SetUnhandledExceptionFilter, | 34_2_0000023BBDCD6218 |
Source: C:\Windows\System32\svchost.exe | Code function: 34_2_0000023BBDCC7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 34_2_0000023BBDCC7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D954D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 35_2_00000227D954D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 35_2_00000227D9547D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 35_2_00000227D9547D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2CAD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_000002DED2CAD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002DED2CA7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_000002DED2CA7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 37_2_0000014ACE6ED2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 37_2_0000014ACE6E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 37_2_0000014ACE6E7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AF667D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 38_2_00000220AF667D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 38_2_00000220AF66D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 38_2_00000220AF66D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B6977D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 39_2_00000241B6977D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 39_2_00000241B697D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 39_2_00000241B697D2A4 |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 2D016580000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 2D6F14E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 14E41FA0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 1D15B010000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23AF32B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23C9FD60000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A1CA6E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 246ED7B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 200A1980000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22595FB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22E670C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1FE4A4B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 24C19A40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 275D1FC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23BBDC90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 227D8FC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2DED2C70000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 14ACE6B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 220AEFD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 241B6940000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 202A22A0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 14D25AA0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1BD1A2F0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 21A63950000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1834ABA0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2D8F03D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 18BAF3C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 256EBEB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2568E1B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 226A7DC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\spoolsv.exe base: 12A0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1E2C0F50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2EE0D7C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22B68FC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 207EA5B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE9B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 11CD6340000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1AFDEB70000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 207C0460000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 245A2150000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 24708EB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22F60740000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26E569B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2CA8FE60000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\sihost.exe base: 1D63DC20000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A799B20000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F6963C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26481BB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 166D2D90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ctfmon.exe base: 128DE440000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2101D0E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\explorer.exe base: 86A0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 192D1E50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26DD2000000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 257155B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dasHost.exe base: 16443E50000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A9452E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 29227D20000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\smartscreen.exe base: 14BB07C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22C4F660000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE850000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 281CF7C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28843650000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2761C420000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 1ED974C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 14FE9140000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1BB54D40000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22F380C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 234F31D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B1C6A90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1D4049E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1D404D90000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\winlogon.exe EIP: 1658273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\lsass.exe EIP: F14E273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 41FA273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\dwm.exe EIP: 5B01273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: F32B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 9FD6273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: CA6E273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: ED7B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: A198273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 95FB273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 670C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 4A4B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 19A4273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: D1FC273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: BDC9273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: D8FC273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: D2C7273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: CE6B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: AEFD273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: B694273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: A22A273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 25AA273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 1A2F273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 6395273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 4ABA273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: F03D273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: AF3C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: EBEB273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8E1B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A7DC273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 12A273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C0F5273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D7C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 68FC273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: EA5B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: CE9B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D634273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DEB7273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C046273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A215273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8EB273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6074273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 569B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8FE6273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 3DC2273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 99B2273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 963C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 81BB273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D2D9273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DE44273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1D0E273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 86A273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D1E5273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D200273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 155B273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 43E5273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A6FC273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6828273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 452E273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 27D2273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: E5C0273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: B07C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4F66273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AE85273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1B9F273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F3CD273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: CF7C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4365273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1C42273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 974C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: E914273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 54D4273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 380C273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F31D273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C6A9273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 49E273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4D9273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 2D016580000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 2D6F14E0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14E41FA0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1D15B010000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23AF32B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23C9FD60000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A1CA6E0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 246ED7B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 200A1980000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22595FB0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22E670C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FE4A4B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24C19A40000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 275D1FC0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23BBDC90000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 227D8FC0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2DED2C70000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14ACE6B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 220AEFD0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 241B6940000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 202A22A0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14D25AA0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1BD1A2F0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21A63950000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1834ABA0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2D8F03D0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 18BAF3C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 256EBEB0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2568E1B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 226A7DC0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 12A0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E2C0F50000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2EE0D7C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22B68FC0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA5B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE9B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 11CD6340000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1AFDEB70000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 207C0460000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 245A2150000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24708EB0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22F60740000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26E569B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2CA8FE60000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 1D63DC20000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A799B20000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F6963C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26481BB0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 166D2D90000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 128DE440000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2101D0E0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 86A0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 192D1E50000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26DD2000000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257155B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 16443E50000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A9452E0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 29227D20000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 14BB07C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C4F660000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE850000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 281CF7C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28843650000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2761C420000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1ED974C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 14FE9140000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1BB54D40000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22F380C0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 234F31D0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B1C6A90000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D4049E0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D404D90000 value starts with: 4D5A | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\System32\dialer.exe base: A832518010 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 2D016580000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 2D6F14E0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14E41FA0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1D15B010000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23AF32B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23C9FD60000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A1CA6E0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 246ED7B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 200A1980000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22595FB0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22E670C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FE4A4B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24C19A40000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 275D1FC0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23BBDC90000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 227D8FC0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2DED2C70000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14ACE6B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 220AEFD0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 241B6940000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 202A22A0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 14D25AA0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1BD1A2F0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21A63950000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1834ABA0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2D8F03D0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 18BAF3C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 256EBEB0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2568E1B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 226A7DC0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 12A0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E2C0F50000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2EE0D7C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22B68FC0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA5B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE9B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 11CD6340000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1AFDEB70000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 207C0460000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 245A2150000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24708EB0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22F60740000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26E569B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2CA8FE60000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 1D63DC20000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A799B20000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F6963C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26481BB0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 166D2D90000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 128DE440000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2101D0E0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 86A0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 192D1E50000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26DD2000000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257155B0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 16443E50000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A9452E0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 29227D20000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 14BB07C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C4F660000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE850000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 281CF7C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28843650000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2761C420000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1ED974C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 14FE9140000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1BB54D40000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22F380C0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 234F31D0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B1C6A90000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D4049E0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D404D90000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 207EA610000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1834B270000 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |