Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdbTCDE.@ source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dropper.pdb source: dropper.exe |
Source: | Binary string: rnlmp.pdbxC4 source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000016.00000000.1980206855.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3719951023.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb source: dropper.exe, 00000000.00000003.1855774737.00000236C9808000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1857886263.00000236C9857000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3723910614.0000018B3C42B000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000003.00000002.3713846370.0000018B3A167000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3731019737.00007FFBFD5EB000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: ntkrnlmp.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062.pdb source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991 source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.error source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 00000016.00000000.1980482592.000001FE4106C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3725498971.000001FE4106C000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errorj source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb' source: dropper.exe, 00000000.00000003.1855774737.00000236C9808000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1857886263.00000236C9857000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3723910614.0000018B3C42B000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000003.00000002.3713846370.0000018B3A167000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3731019737.00007FFBFD5EB000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000016.00000000.1980206855.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3719951023.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000016.00000000.1980206855.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3719951023.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: lsass.exe, 00000006.00000000.1906488047.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907287496.000001F2E2068000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3748011679.000001F2E2259000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3722300328.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3737265635.000001F2E2068000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906172737.000001F2E1800000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3716790665.000001F2E1800000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3748011679.000001F2E2259000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: lsass.exe, 00000006.00000000.1906488047.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E2094000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3722300328.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000000.1930929743.000002736F820000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000002.3787235451.000002736F820000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: lsass.exe, 00000006.00000003.3217007845.000001F2E2094000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000000.1930929743.000002736F820000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000002.3787235451.000002736F820000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: lsass.exe, 00000006.00000000.1906488047.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907287496.000001F2E2068000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3748011679.000001F2E2259000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3722300328.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3737265635.000001F2E2068000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906172737.000001F2E1800000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3716790665.000001F2E1800000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3748011679.000001F2E2259000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~ |
Source: svchost.exe, 00000025.00000000.2035922851.000001C82F495000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.2241407674.000001C82F42A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.2242080776.000001C82F495000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.2035347461.000001C82F42A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.2035968508.000001C82F4BB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/ |
Source: lsass.exe, 00000006.00000000.1907578317.000001F2E20F6000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3742434209.000001F2E20F6000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 00000006.00000002.3724864000.000001F2E18CE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906599240.000001F2E18CE000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: lsass.exe, 00000006.00000000.1906270895.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: lsass.exe, 00000006.00000002.3720198630.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906371373.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: lsass.exe, 00000006.00000000.1906270895.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: dropper.exe | String found in binary or memory: http://ns.adobe. |
Source: svchost.exe, 00000025.00000000.2035406193.000001C82F440000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.2241469753.000001C82F440000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com/ |
Source: lsass.exe, 00000006.00000000.1906488047.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906172737.000001F2E1800000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3716790665.000001F2E1800000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907287496.000001F2E2068000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3748011679.000001F2E2259000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3722300328.000001F2E1888000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3737265635.000001F2E2068000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0H |
Source: svchost.exe, 0000001B.00000002.3734901120.000002182FDD0000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: lsass.exe, 00000006.00000000.1906270895.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3720198630.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906371373.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: lsass.exe, 00000006.00000002.3720198630.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906371373.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: lsass.exe, 00000006.00000000.1906270895.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3720198630.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906371373.000001F2E1850000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: lsass.exe, 00000006.00000000.1906270895.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: lsass.exe, 00000006.00000000.1906270895.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties |
Source: lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: lsass.exe, 00000006.00000000.1906270895.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3718575754.000001F2E182E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P |
Source: lsass.exe, 00000006.00000002.3748011679.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000003.3217007845.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1908009573.000001F2E2200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E20C2000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: svchost.exe, 00000022.00000000.2026897865.000001EA50A23000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3781446748.000001EA50A23000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3781727466.000001EA50A49000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.msftconnecttest.com/ |
Source: svchost.exe, 00000022.00000002.3774288001.000001EA4FED8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.2026006981.000001EA4FEF3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.2025747991.000001EA4FED8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3776099400.000001EA4FEF3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.msftconnecttest.com/connecttest.txt |
Source: lsass.exe, 00000006.00000003.3217007845.000001F2E2094000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000000.1930929743.000002736F820000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000002.3787235451.000002736F820000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.quovadis.bm0 |
Source: svchost.exe, 00000007.00000002.3753664786.0000028186647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1913342661.0000028186647000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.onenote.net/livetile/?Language= |
Source: dropper.exe, tempdll.dll.0.dr | String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support |
Source: svchost.exe, 0000002A.00000000.2058607590.000001E74C423000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3778892876.000001E74C423000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.comSRD1% |
Source: svchost.exe, 00000025.00000002.2241407674.000001C82F42A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.2035347461.000001C82F42A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/ |
Source: lsass.exe, 00000006.00000003.3217007845.000001F2E2094000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3739196122.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1907351514.000001F2E2095000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000000.1930929743.000002736F820000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000002.3787235451.000002736F820000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ocsp.quovadisoffshore.com0 |
Source: svchost.exe, 0000002A.00000000.2051366875.000001E74AE65000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.com |
Source: svchost.exe, 0000002A.00000000.2052912145.000001E74B900000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3114422886.000001E74B903000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.2058607590.000001E74C423000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3114855996.000001E74B92D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3749777532.000001E74B931000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3778892876.000001E74C423000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.comSRD1- |
Source: svchost.exe, 0000002A.00000000.2051366875.000001E74AE65000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.comcom |
Source: svchost.exe, 0000002A.00000000.2058607590.000001E74C423000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3778892876.000001E74C423000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comSRD13 |
Source: svchost.exe, 00000007.00000000.1913080338.0000028186600000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3750551577.0000028186600000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://spclient.wg.spotify.com/v1/live-tile-xml?region= |
Source: svchost.exe, 00000007.00000000.1915700291.0000028186CAF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3769748764.0000028186CAF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.2524514466.0000028186CAF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.cn/shellRESP |
Source: svchost.exe, 00000007.00000000.1915700291.0000028186CAF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3769748764.0000028186CAF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.2524514466.0000028186CAF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com/shell |
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.23.dr | String found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAABRgjxu7x%2fdyWqbOoAAI8Gcd5ckhbCzw7F7Uxfu5MqaJ5M0DU |
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.23.dr | String found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAACOo%2bDpegMJ4mimyuZb31GqC7oXjlMabDDVUR8qnW8cVhNR3Y |
Source: svchost.exe, 0000002A.00000000.2057998047.000001E74C168000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.com |
Source: svchost.exe, 0000002A.00000000.2057998047.000001E74C168000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.com.com |
Source: svchost.exe, 0000002A.00000002.3725499698.000001E74AE77000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.2051421492.000001E74AE77000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.2058607590.000001E74C423000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.2054757075.000001E74BBEF000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3778892876.000001E74C423000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.comSRD1# |
Source: svchost.exe, 0000002A.00000002.3757690094.000001E74BA23000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.2053698567.000001E74BA23000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/pwaimages |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C071350 | 0_2_00007FF71C071350 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C089540 | 0_2_00007FF71C089540 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C072DA0 | 0_2_00007FF71C072DA0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C0721C0 | 0_2_00007FF71C0721C0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C077DF0 | 0_2_00007FF71C077DF0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C075400 | 0_2_00007FF71C075400 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C074E40 | 0_2_00007FF71C074E40 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C077480 | 0_2_00007FF71C077480 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C07A6C0 | 0_2_00007FF71C07A6C0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C076AE0 | 0_2_00007FF71C076AE0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C084D10 | 0_2_00007FF71C084D10 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1C7CF0 | 0_2_00007FF71C1C7CF0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A1950 | 0_2_00007FF71C1A1950 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A3520 | 0_2_00007FF71C1A3520 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A1F20 | 0_2_00007FF71C1A1F20 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C084750 | 0_2_00007FF71C084750 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1C7530 | 0_2_00007FF71C1C7530 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A2D80 | 0_2_00007FF71C1A2D80 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A0D70 | 0_2_00007FF71C1A0D70 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1BE3D0 | 0_2_00007FF71C1BE3D0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1B87A0 | 0_2_00007FF71C1B87A0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A3050 | 0_2_00007FF71C1A3050 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A0420 | 0_2_00007FF71C1A0420 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A2220 | 0_2_00007FF71C1A2220 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A2630 | 0_2_00007FF71C1A2630 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1AFC30 | 0_2_00007FF71C1AFC30 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1C2680 | 0_2_00007FF71C1C2680 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A3290 | 0_2_00007FF71C1A3290 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A1C60 | 0_2_00007FF71C1A1C60 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C084A90 | 0_2_00007FF71C084A90 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A3870 | 0_2_00007FF71C1A3870 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A12B0 | 0_2_00007FF71C1A12B0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C0856F0 | 0_2_00007FF71C0856F0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1CDF10 | 0_2_00007FF71C1CDF10 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1A2AF0 | 0_2_00007FF71C1A2AF0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF71C1B16F0 | 0_2_00007FF71C1B16F0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40E270 | 3_2_0000018B3C40E270 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40CC70 | 3_2_0000018B3C40CC70 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C406270 | 3_2_0000018B3C406270 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F4E40 | 3_2_0000018B3C3F4E40 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C419EA0 | 3_2_0000018B3C419EA0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C400CA0 | 3_2_0000018B3C400CA0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40C6A0 | 3_2_0000018B3C40C6A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3FCC30 | 3_2_0000018B3C3FCC30 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C401E30 | 3_2_0000018B3C401E30 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C418440 | 3_2_0000018B3C418440 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40D840 | 3_2_0000018B3C40D840 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C405E40 | 3_2_0000018B3C405E40 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F7480 | 3_2_0000018B3C3F7480 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F6AE0 | 3_2_0000018B3C3F6AE0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C425D00 | 3_2_0000018B3C425D00 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C429F10 | 3_2_0000018B3C429F10 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C4004B0 | 3_2_0000018B3C4004B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40BAC0 | 3_2_0000018B3C40BAC0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C403CC0 | 3_2_0000018B3C403CC0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40DAD0 | 3_2_0000018B3C40DAD0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3FE6D0 | 3_2_0000018B3C3FE6D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C4218D0 | 3_2_0000018B3C4218D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40CF70 | 3_2_0000018B3C40CF70 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40B170 | 3_2_0000018B3C40B170 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C428770 | 3_2_0000018B3C428770 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40D380 | 3_2_0000018B3C40D380 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C424380 | 3_2_0000018B3C424380 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C420D80 | 3_2_0000018B3C420D80 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F1350 | 3_2_0000018B3C3F1350 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40DDA0 | 3_2_0000018B3C40DDA0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C4049A0 | 3_2_0000018B3C4049A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F2DA0 | 3_2_0000018B3C3F2DA0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3FF940 | 3_2_0000018B3C3FF940 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3FA5E0 | 3_2_0000018B3C3FA5E0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40C000 | 3_2_0000018B3C40C000 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F21C0 | 3_2_0000018B3C3F21C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C405A20 | 3_2_0000018B3C405A20 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C400A20 | 3_2_0000018B3C400A20 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C4175B0 | 3_2_0000018B3C4175B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40C9B0 | 3_2_0000018B3C40C9B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C4029B0 | 3_2_0000018B3C4029B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40E5C0 | 3_2_0000018B3C40E5C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C4007D0 | 3_2_0000018B3C4007D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F5400 | 3_2_0000018B3C3F5400 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C40DFE0 | 3_2_0000018B3C40DFE0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C4277E0 | 3_2_0000018B3C4277E0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C427FE0 | 3_2_0000018B3C427FE0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_0000018B3C3F7DF0 | 3_2_0000018B3C3F7DF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5B5400 | 3_2_00007FFBFD5B5400 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5B21C0 | 3_2_00007FFBFD5B21C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5C29B0 | 3_2_00007FFBFD5C29B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5B7480 | 3_2_00007FFBFD5B7480 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5B4E40 | 3_2_00007FFBFD5B4E40 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5C1E30 | 3_2_00007FFBFD5C1E30 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5C0CA0 | 3_2_00007FFBFD5C0CA0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5B1350 | 3_2_00007FFBFD5B1350 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CC000 | 3_2_00007FFBFD5CC000 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5E77E0 | 3_2_00007FFBFD5E77E0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CDFE0 | 3_2_00007FFBFD5CDFE0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CE5C0 | 3_2_00007FFBFD5CE5C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CDDA0 | 3_2_00007FFBFD5CDDA0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5D75B0 | 3_2_00007FFBFD5D75B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CC9B0 | 3_2_00007FFBFD5CC9B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CCC70 | 3_2_00007FFBFD5CCC70 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CE270 | 3_2_00007FFBFD5CE270 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5C6270 | 3_2_00007FFBFD5C6270 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5D8440 | 3_2_00007FFBFD5D8440 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CD840 | 3_2_00007FFBFD5CD840 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5C5E40 | 3_2_00007FFBFD5C5E40 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5C5A20 | 3_2_00007FFBFD5C5A20 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5E5D00 | 3_2_00007FFBFD5E5D00 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5E9F10 | 3_2_00007FFBFD5E9F10 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CBAC0 | 3_2_00007FFBFD5CBAC0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5E18D0 | 3_2_00007FFBFD5E18D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CDAD0 | 3_2_00007FFBFD5CDAD0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5D9EA0 | 3_2_00007FFBFD5D9EA0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CC6A0 | 3_2_00007FFBFD5CC6A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5C04B0 | 3_2_00007FFBFD5C04B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5E4380 | 3_2_00007FFBFD5E4380 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5E0D80 | 3_2_00007FFBFD5E0D80 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CD380 | 3_2_00007FFBFD5CD380 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CCF70 | 3_2_00007FFBFD5CCF70 |
Source: C:\Windows\System32\cmd.exe | Code function: 3_2_00007FFBFD5CB170 | 3_2_00007FFBFD5CB170 |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdbTCDE.@ source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dropper.pdb source: dropper.exe |
Source: | Binary string: rnlmp.pdbxC4 source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: WINLOA~1.PDBwinload_prod.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000016.00000000.1980206855.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3719951023.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb source: dropper.exe, 00000000.00000003.1855774737.00000236C9808000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1857886263.00000236C9857000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3723910614.0000018B3C42B000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000003.00000002.3713846370.0000018B3A167000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3731019737.00007FFBFD5EB000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: ntkrnlmp.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062.pdb source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991 source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.error source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 00000016.00000000.1980482592.000001FE4106C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3725498971.000001FE4106C000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errorj source: svchost.exe, 00000016.00000000.1980287685.000001FE41048000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3721582776.000001FE41048000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb' source: dropper.exe, 00000000.00000003.1855774737.00000236C9808000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1857886263.00000236C9857000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3723910614.0000018B3C42B000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000003.00000002.3713846370.0000018B3A167000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000003.00000002.3731019737.00007FFBFD5EB000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000016.00000002.3723062033.000001FE41057000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1980368839.000001FE41057000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000016.00000000.1980206855.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3719951023.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000016.00000000.1980206855.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3719951023.000001FE4102A000.00000004.00000001.00020000.00000000.sdmp |
Source: lsass.exe, 00000006.00000002.3723138243.000001F2E18A6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicshutdownNT SERVICE |
Source: svchost.exe, 00000017.00000002.3721796406.00000174A5442000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1984815923.00000174A5442000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor |
Source: lsass.exe, 00000006.00000002.3723138243.000001F2E18A6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicvssNT SERVICE |
Source: svchost.exe, 00000007.00000002.3755225460.000002818667E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicshutdown |
Source: svchost.exe, 0000000C.00000000.1922864973.0000022F57C2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.3772917471.0000022F57C2A000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp |
Source: svchost.exe, 00000007.00000000.1912424622.0000028185C35000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: $@vmicheartbeat |
Source: svchost.exe, 00000007.00000000.1912424622.0000028185C35000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicvss |
Source: svchost.exe, 0000000C.00000000.1922864973.0000022F57C2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.3772917471.0000022F57C2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3771718250.000001EA4FE6A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3771358684.000001EA4FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.2025380455.000001EA4FE6A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3773189917.000001EA4FEA2000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.2025317936.000001EA4FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002B.00000002.3722940511.000002ED9A05E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002B.00000000.2061981874.000002ED9A05E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000020.00000000.2019711355.000001F362600000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc |
Source: lsass.exe, 00000006.00000002.3723138243.000001F2E18A6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicheartbeatNT SERVICE |
Source: svchost.exe, 00000007.00000000.1912424622.0000028185C35000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @vmicshutdown |
Source: lsass.exe, 00000006.00000002.3717662966.000001F2E1813000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1906220696.000001F2E1813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.3715759126.0000023634813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000000.1926273911.0000023634813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.3717941517.000001EA7E22B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1963378516.000001EA7E22B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.3717173017.0000027621429000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1964854274.0000027621429000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000000.1970766916.00000147A345A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.3723906951.00000147A345A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.3721796406.00000174A5442000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000007.00000002.3755225460.000002818667E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicheartbeat |
Source: svchost.exe, 00000007.00000000.1912424622.0000028185C35000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @vmicheartbeat |
Source: C:\Users\user\Desktop\dropper.exe | Memory written: C:\Windows\System32\cmd.exe base: 18B3A020000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\winlogon.exe base: 217D54C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\lsass.exe base: 1F2E1F10000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 28186B40000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\fontdrvhost.exe base: 2664CA80000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\fontdrvhost.exe base: 13D7E420000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 22F57BF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 23634780000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\dwm.exe base: 27375B10000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F9BDA90000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1EA7E1E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 276213D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 17CF7270000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 147A41E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHDCPSvc.exe base: 15E1D4E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2BCBDFE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FE41EF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 174A53F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A5DC270000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxCUIService.exe base: 16695DE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHeciSvc.exe base: 1DA59730000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 218305B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 18FDB8C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 24A877A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F1365E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B0005F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F363390000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F716BC0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1EA50670000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 25D4D760000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 29DAC1E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C82FD20000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2428F430000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E5211A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 261E89D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 14EC7EA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E74B710000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2ED99FF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2633A390000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 600000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1793BD30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B89A750000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2C20FEF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DD2AFC0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2767ECF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A88ACA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C659020000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 276A72E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 19A21740000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_78ff17a5ea060c5f\OneApp.IGCC.WinService.exe base: 2BE79EF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBECEE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 201793A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_ffc75848a6342fdf\jhi_service.exe base: 1DE56380000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CD5C3B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 24C0F740000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 26CF5F30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\sihost.exe base: 18DC9C20000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E73DC50000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe base: 1730000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F5D6DE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D21E4E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 220F8E20000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2C49DD90000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 1D5CADF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\explorer.exe base: 2D90000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxEM.exe base: 1AC38D60000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 237ABA50000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: 1FBA9F50000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 2BD913F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: 13685FD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1FE60EE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D227BC0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D599050000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe base: 1472FBA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\SettingSyncHost.exe base: 16547A50000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe base: 1DF631D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1EF1DBD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\audiodg.exe base: 1EDF6860000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\dllhost.exe base: 177B1280000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1F9D0970000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 18664C90000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe base: 600000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2C7370C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E79B880000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1F9A3570000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1EE56C40000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 2685ABB0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 24AD9080000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 231C3350000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 1B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\conhost.exe base: 17246820000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\dllhost.exe base: 18A4F660000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A5CC100000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 242AC3F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1ED267F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: FE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 5B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: C20000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1070000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 590000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: F50000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 7D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: ED0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 500000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: DB0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 970000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: BB0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 3B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 7F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: DF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 500000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: EF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 980000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1330000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 690000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1410000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: A00000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 11B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 930000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 370000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 780000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 830000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 550000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 13F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 12E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: D50000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 590000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1330000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 780000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 500000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 10E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 370000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: D50000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: BB0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: AD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: D00000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 610000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1330000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: F10000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 560000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 710000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 970000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: E60000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 740000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1350000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: F80000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: C00000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: E40000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1300000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: E70000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: A30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 5D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: B20000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 600000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: D60000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: D40000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1080000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: B10000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 740000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1390000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: E00000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1400000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1140000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 7A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: F10000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 15C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 15A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: DA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: DA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 700000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: A30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 770000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: FC0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 7C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 710000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: B60000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1040000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 1200000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: DD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files (x86)\xlhcdIWgLWGwuhJsFxDzcSHbAunxGDVrKhKIRJvwcGhPiH\dZnuwWDiBQtInGlCOSs.exe base: 3C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 194B1A60000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 2819CD40000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 22F57B70000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |