Source: lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: lsass.exe, 0000001F.00000002.3238221679.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821473498.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03BA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821473498.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: lsass.exe, 0000001F.00000003.2271906692.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821838171.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242123112.00000202C0379000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: WindowsAutHost, 00000025.00000003.1882707628.0000016F8FAF0000.00000004.00000001.00020000.00000000.sdmp, ybmcltmshprh.sys.37.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: WindowsAutHost, 00000025.00000003.1882707628.0000016F8FAF0000.00000004.00000001.00020000.00000000.sdmp, ybmcltmshprh.sys.37.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: WindowsAutHost, 00000025.00000003.1882707628.0000016F8FAF0000.00000004.00000001.00020000.00000000.sdmp, ybmcltmshprh.sys.37.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: WindowsAutHost, 00000025.00000003.1882707628.0000016F8FAF0000.00000004.00000001.00020000.00000000.sdmp, ybmcltmshprh.sys.37.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03BA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821473498.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 0000001F.00000002.3238221679.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821473498.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 0000001F.00000003.2271906692.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821838171.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242123112.00000202C0379000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: lsass.exe, 0000001F.00000002.3239359444.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821660332.00000202C024B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1822282202.00000202C043D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000003.2281801480.00000202C0249000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: lsass.exe, 0000001F.00000002.3238221679.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821473498.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 0000001F.00000003.2271906692.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821838171.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242123112.00000202C0379000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: lsass.exe, 0000001F.00000002.3238221679.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821473498.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 0000001F.00000002.3239359444.00000202C0200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821631460.00000202C0200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: lsass.exe, 0000001F.00000000.1821371502.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3237848048.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: lsass.exe, 0000001F.00000002.3238221679.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03BA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821473498.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 0000001F.00000002.3239359444.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821660332.00000202C024B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1822282202.00000202C043D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000003.2281801480.00000202C0249000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: lsass.exe, 0000001F.00000003.2271906692.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821838171.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242123112.00000202C0379000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0H |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0I |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.msocsp. |
Source: lsass.exe, 0000001F.00000003.2271906692.00000202C038E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000003.2271906692.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3239359444.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821838171.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821660332.00000202C024B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000003.2281801480.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242123112.00000202C0379000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821371502.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3237848048.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties |
Source: lsass.exe, 0000001F.00000002.3237726005.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821333455.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: lsass.exe, 0000001F.00000000.1821977863.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: lsass.exe, 0000001F.00000003.2271906692.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821838171.00000202C0351000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242305511.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000000.1821977863.00000202C03B5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001F.00000002.3242123112.00000202C0379000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: C:\Windows\System32\dialer.exe | Code function: 25_2_000000014000226C | 25_2_000000014000226C |
Source: C:\Windows\System32\dialer.exe | Code function: 25_2_00000001400014D8 | 25_2_00000001400014D8 |
Source: C:\Windows\System32\dialer.exe | Code function: 25_2_0000000140002560 | 25_2_0000000140002560 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC611F2C | 30_2_00000225DC611F2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC61D0E0 | 30_2_00000225DC61D0E0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6238A8 | 30_2_00000225DC6238A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC642B2C | 30_2_00000225DC642B2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC64DCE0 | 30_2_00000225DC64DCE0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6544A8 | 30_2_00000225DC6544A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC671F2C | 30_2_00000225DC671F2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC67D0E0 | 30_2_00000225DC67D0E0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6838A8 | 30_2_00000225DC6838A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6A2B2C | 30_2_00000225DC6A2B2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6ADCE0 | 30_2_00000225DC6ADCE0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6B44A8 | 30_2_00000225DC6B44A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0AB1F2C | 31_2_00000202C0AB1F2C |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0AC38A8 | 31_2_00000202C0AC38A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0ABD0E0 | 31_2_00000202C0ABD0E0 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0AE2B2C | 31_2_00000202C0AE2B2C |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0AF44A8 | 31_2_00000202C0AF44A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0AEDCE0 | 31_2_00000202C0AEDCE0 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0B42B2C | 31_2_00000202C0B42B2C |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0B544A8 | 31_2_00000202C0B544A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0B4DCE0 | 31_2_00000202C0B4DCE0 |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1A41F2C | 33_2_000001BCD1A41F2C |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1A4D0E0 | 33_2_000001BCD1A4D0E0 |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1A538A8 | 33_2_000001BCD1A538A8 |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1C52B2C | 33_2_000001BCD1C52B2C |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1C5DCE0 | 33_2_000001BCD1C5DCE0 |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1C644A8 | 33_2_000001BCD1C644A8 |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC5238A8 | 35_2_000001AFBC5238A8 |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC51D0E0 | 35_2_000001AFBC51D0E0 |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC511F2C | 35_2_000001AFBC511F2C |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC5544A8 | 35_2_000001AFBC5544A8 |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC54DCE0 | 35_2_000001AFBC54DCE0 |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC542B2C | 35_2_000001AFBC542B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A6612D1F2C | 36_2_000002A6612D1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A6612DD0E0 | 36_2_000002A6612DD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A6612E38A8 | 36_2_000002A6612E38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A661302B2C | 36_2_000002A661302B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A66131AEC5 | 36_2_000002A66131AEC5 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A66130DCE0 | 36_2_000002A66130DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A6613144A8 | 36_2_000002A6613144A8 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDA1F2C | 38_2_000002BAAEDA1F2C |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDAD0E0 | 38_2_000002BAAEDAD0E0 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDB38A8 | 38_2_000002BAAEDB38A8 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDD2B2C | 38_2_000002BAAEDD2B2C |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDDDCE0 | 38_2_000002BAAEDDDCE0 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDE44A8 | 38_2_000002BAAEDE44A8 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEE01F2C | 38_2_000002BAAEE01F2C |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEE0D0E0 | 38_2_000002BAAEE0D0E0 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEE138A8 | 38_2_000002BAAEE138A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A8799D0E0 | 42_2_0000026A8799D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A879A38A8 | 42_2_0000026A879A38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A87991F2C | 42_2_0000026A87991F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A879CDCE0 | 42_2_0000026A879CDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A879D44A8 | 42_2_0000026A879D44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A879C2B2C | 42_2_0000026A879C2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_00000179537838A8 | 43_2_00000179537838A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_000001795377D0E0 | 43_2_000001795377D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_0000017953771F2C | 43_2_0000017953771F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_00000179537B44A8 | 43_2_00000179537B44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_00000179537ADCE0 | 43_2_00000179537ADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_00000179537A2B2C | 43_2_00000179537A2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D53D0E0 | 44_2_000002295D53D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D5438A8 | 44_2_000002295D5438A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D531F2C | 44_2_000002295D531F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D56DCE0 | 44_2_000002295D56DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D5744A8 | 44_2_000002295D5744A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D562B2C | 44_2_000002295D562B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_00000253067D1F2C | 45_2_00000253067D1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_00000253067DD0E0 | 45_2_00000253067DD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_00000253067E38A8 | 45_2_00000253067E38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306E62B2C | 45_2_0000025306E62B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306E6DCE0 | 45_2_0000025306E6DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306E744A8 | 45_2_0000025306E744A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306EC2B2C | 45_2_0000025306EC2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306ECDCE0 | 45_2_0000025306ECDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306ED44A8 | 45_2_0000025306ED44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001845B9544A8 | 53_2_000001845B9544A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001845B94DCE0 | 53_2_000001845B94DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001845B942B2C | 53_2_000001845B942B2C |
Source: unknown | Process created: C:\Users\user\Desktop\services64.exe "C:\Users\user\Desktop\services64.exe" | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "WindowsAutHost" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "WindowsAutHost" binpath= "C:\ProgramData\WindowsServices\WindowsAutHost" start= "auto" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "WindowsAutHost" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\ProgramData\WindowsServices\WindowsAutHost C:\ProgramData\WindowsServices\WindowsAutHost | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "WindowsAutHost" | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "WindowsAutHost" binpath= "C:\ProgramData\WindowsServices\WindowsAutHost" start= "auto" | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "WindowsAutHost" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\services64.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC647D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_00000225DC647D90 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC64D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_00000225DC64D2A4 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6A7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_00000225DC6A7D90 |
Source: C:\Windows\System32\winlogon.exe | Code function: 30_2_00000225DC6AD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_00000225DC6AD2A4 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0AED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_00000202C0AED2A4 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0AE7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_00000202C0AE7D90 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0B4D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_00000202C0B4D2A4 |
Source: C:\Windows\System32\lsass.exe | Code function: 31_2_00000202C0B47D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_00000202C0B47D90 |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1C5D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 33_2_000001BCD1C5D2A4 |
Source: C:\Windows\System32\sc.exe | Code function: 33_2_000001BCD1C57D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 33_2_000001BCD1C57D90 |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC547D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 35_2_000001AFBC547D90 |
Source: C:\Windows\System32\conhost.exe | Code function: 35_2_000001AFBC54D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 35_2_000001AFBC54D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A66130D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_000002A66130D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 36_2_000002A661307D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_000002A661307D90 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDD7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 38_2_000002BAAEDD7D90 |
Source: C:\Windows\System32\dwm.exe | Code function: 38_2_000002BAAEDDD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 38_2_000002BAAEDDD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A879CD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 42_2_0000026A879CD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 42_2_0000026A879C7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 42_2_0000026A879C7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_00000179537A7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 43_2_00000179537A7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 43_2_00000179537AD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 43_2_00000179537AD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D56D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 44_2_000002295D56D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 44_2_000002295D567D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 44_2_000002295D567D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306E6D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 45_2_0000025306E6D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306E67D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 45_2_0000025306E67D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306ECD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 45_2_0000025306ECD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 45_2_0000025306EC7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 45_2_0000025306EC7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001845B94D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 53_2_000001845B94D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001845B947D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 53_2_000001845B947D90 |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 225DC610000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 202C0AB0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2A6612D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 2BAAEDA0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26A87990000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 17953770000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2295D530000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 253067D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1845B390000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 225DC670000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 202C0B10000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2A661330000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 2BAAEE00000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26A87F40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 179537D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2295D590000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 25306E90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1845B3C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D559040000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 241A9E70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1CD73160000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2824E860000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 21B473C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2086F9D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 17183BC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23FD3F70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D2A4150000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 275BDF30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1AAC0260000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 203C9F30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1B5644B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1C004F60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 24E2AB40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2644ADB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\spoolsv.exe base: 1990000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 20D25DA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26EF5350000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2A7F0D60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23D0FFB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1B1C2570000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2108B940000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 29166940000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1988D570000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 13869B40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1E1CC740000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2855DA70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2BF199D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 15AF3890000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 21A03B80000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\sihost.exe base: 1CD40E40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 151A6530000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 19E27BC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 17D7B150000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1BE621A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2252F480000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 184683D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\explorer.exe base: 7D80000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1972E260000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dasHost.exe base: 2246C5E0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 221D5930000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A633B40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2928D0A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\smartscreen.exe base: 1A22A640000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 21C6CF30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF64500000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\audiodg.exe base: 1D349350000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23B60D80000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F22F7C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B7733C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 27076D90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 171DB7C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 2D1856F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 1BC980F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1F38C3F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 200AC5B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D079160000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1E9C6BB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 28CE63D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\sc.exe base: 1BCD1A40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 1AFBC510000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\ProgramData\WindowsServices\WindowsAutHost base: 16F8FB60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1D849410000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 1A7540D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1E5BE130000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1E5BE160000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\winlogon.exe EIP: DC61273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\lsass.exe EIP: C0AB273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 612D273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\dwm.exe EIP: AEDA273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 8799273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 5377273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 5D53273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 67D273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DC67273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C0B1273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6133273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AEE0273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 87F4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 537D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5D59273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6E9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5B3C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: EBFD273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5904273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A9E7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7316273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4E86273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 473C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6F9D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 83BC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D3F7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A415273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: BDF3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C026273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C9F3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 644B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7B2A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4F6273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 2AB4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4ADB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 199273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 25DA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F535273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F0D6273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FFB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C257273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8B94273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6694273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 13EF273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8D57273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 69B4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: CC74273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5DA7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 199D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F389273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 3B8273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 40E4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A653273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 27BC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7B15273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 621A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 2F48273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8B4B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 683D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7D8273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 2E26273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6C5E273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D593273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FC65273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7874273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 33B4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8D0A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AB4C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 2A64273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6CF3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6450273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4935273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 60D8273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5E7B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 2F7C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: E815273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5234273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 9DA9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 602E273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 733C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 76D9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DB7C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 856F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 980F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8C3F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AC5B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7916273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C6BB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: E63D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D1A4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: BC51273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4941273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 540D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: BE13273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: BE16273C | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQueryInformationProcess: Direct from: 0x7FF74E634835 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQuerySystemInformation: Direct from: 0x7FF79AEBA2EB | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtOpenFile: Direct from: 0x7FF74E5E0D15 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQueryInformationProcess: Direct from: 0x7FF79AEC5690 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQuerySystemInformation: Direct from: 0x7FF74E6395C3 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQuerySystemInformation: Direct from: 0x7FF79B4EDE4E | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtSetInformationThread: Direct from: 0x7FF79AF0F997 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQueryInformationProcess: Direct from: 0x7FF79BB4925A | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Direct from: 0x7FF79BB644FB | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQuerySystemInformation: Direct from: 0x7FF74DB2FAC8 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQueryInformationProcess: Direct from: 0x7FF79BB70A74 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQueryInformationProcess: Direct from: 0x7FF74D97C620 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Indirect: 0x7FF74D92DB0D | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQuerySystemInformation: Direct from: 0x7FF74D9487D6 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Direct from: 0x7FF79B078272 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Direct from: 0x7FF79AEE7F25 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQueryInformationProcess: Direct from: 0x7FF74DAF2ED6 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtClose: Direct from: 0x7FF79AEC40E5 | |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtSetInformationProcess: Direct from: 0x7FF74DAF8272 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74D9618AE | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74E5E9C17 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Indirect: 0x7FF79AEADB0D | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Direct from: 0x7FF79B570E83 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtSetInformationThread: Direct from: 0x7FF74E60396D | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Direct from: 0x7FF79AECA771 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQueryInformationProcess: Direct from: 0x7FF74D93E62D | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74E5F0A74 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQueryInformationProcess: Direct from: 0x7FF74DFE733E | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74DF65BAC | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtMapViewOfSection: Direct from: 0x7FF74D9A4128 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQueryInformationProcess: Direct from: 0x7FF79AF29773 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Direct from: 0x7FF79B56EBE3 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtProtectVirtualMemory: Direct from: 0x7FF79B072ED6 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74E63DECB | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtMapViewOfSection: Direct from: 0x7FF79B525F28 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74D94E257 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74DFEB966 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74DB17075 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQuerySystemInformation: Direct from: 0x7FF79AEBE62D | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtUnmapViewOfSection: Direct from: 0x7FF74E5C925A | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQueryInformationProcess: Direct from: 0x7FF79B506531 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtSetInformationThread: Direct from: 0x7FF74D9A1621 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQuerySystemInformation: Direct from: 0x7FF74D946775 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtQuerySystemInformation: Direct from: 0x7FF79BBBDECB | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74DB24C63 | Jump to behavior |
Source: C:\Users\user\Desktop\services64.exe | NtUnmapViewOfSection: Direct from: 0x7FF79B0B34D2 | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtQuerySystemInformation: Direct from: 0x7FF74D99B66B | Jump to behavior |
Source: C:\ProgramData\WindowsServices\WindowsAutHost | NtProtectVirtualMemory: Direct from: 0x7FF74DF9854B | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 2BAAEDA0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1845B390000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 225DC670000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 202C0B10000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A661330000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 2BAAEE00000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26A87F40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 179537D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2295D590000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25306E90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1845B3C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B5644B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2108B940000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 29166940000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 7D80000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF64500000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60D80000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B7733C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27076D90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 171DB7C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 2D1856F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1BC980F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1F38C3F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 200AC5B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1D079160000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E9C6BB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 28CE63D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sc.exe base: 1BCD1A40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1AFBC510000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\ProgramData\WindowsServices\WindowsAutHost base: 16F8FB60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1D849410000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1A7540D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1E5BE130000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1E5BE160000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 225DC610000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 2BAAEDA0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26A87990000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17953770000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2295D530000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 253067D0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1845B390000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 28CE5850000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 225DC670000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 202C0B10000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A661330000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 2BAAEE00000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26A87F40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 179537D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2295D590000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25306E90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1845B3C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D559040000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 241A9E70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CD73160000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2824E860000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21B473C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17183BC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 275BDF30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 203C9F30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B5644B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C004F60000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 1990000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26EF5350000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2108B940000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 29166940000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1988D570000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 13869B40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2855DA70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15AF3890000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21A03B80000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 151A6530000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17D7B150000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2252F480000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 184683D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 7D80000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1972E260000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 221D5930000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A633B40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF64500000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\audiodg.exe base: 1D349350000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60D80000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B7733C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27076D90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 171DB7C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 2D1856F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1BC980F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1F38C3F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 200AC5B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1D079160000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E9C6BB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 28CE63D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sc.exe base: 1BCD1A40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1AFBC510000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\ProgramData\WindowsServices\WindowsAutHost base: 16F8FB60000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1D849410000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 1A7540D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1E5BE130000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1E5BE160000 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |