Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errorWt source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dropper.pdb source: dropper.exe |
Source: | Binary string: *@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errornp source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE709.tmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdbTCDE&@ source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991 source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE703.tmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb( source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: WINWORD1.PDBwinload_prod.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: Microsoft-Windows-LiveId%4Operational.evtx.20.dr | String found in binary or memory: http://Passport.NET/tb |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: lsass.exe, 00000006.00000002.3710081396.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848504666.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3670522460.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850167067.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A1641000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1611000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: lsass.exe, 00000006.00000002.3710081396.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848504666.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3670522460.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850167067.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A1641000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1611000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~ |
Source: svchost.exe, 00000025.00000000.1974733961.0000020206895000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.3676059694.0000020206824000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974813642.00000202068A8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.3687431840.00000202068A8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/ |
Source: lsass.exe, 00000006.00000000.1849526547.000001D5A14DD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3697261529.000001D5A14DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 00000006.00000000.1848843522.000001D5A0CD0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3678908754.000001D5A0CD0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: dropper.exe | String found in binary or memory: http://ns.adobe. |
Source: lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digice |
Source: svchost.exe, 00000025.00000002.3686594730.0000020206892000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974733961.0000020206895000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com/ |
Source: lsass.exe, 00000006.00000002.3710081396.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A1641000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848504666.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3670522460.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850167067.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1611000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0H |
Source: svchost.exe, 0000001B.00000000.1947513300.0000015A41530000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties |
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: svchost.exe, 00000022.00000002.3735824849.0000023DCECFA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.1964678338.0000023DCECFA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.msftconnecttest.com/ |
Source: lsass.exe, 00000006.00000000.1849428437.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3694892536.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.quovadis.bm0 |
Source: svchost.exe, 00000007.00000002.3710184662.000001C25487D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1854630671.000001C25487D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.onenote.net/livetile/?Language= |
Source: dropper.exe, tempdll.dll.0.dr | String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support |
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997895867.0000027311F7C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3736012639.0000027311F7C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.comSRD1% |
Source: svchost.exe, 00000025.00000002.3683338710.0000020206876000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974813642.00000202068A8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974587080.0000020206876000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/ |
Source: lsass.exe, 00000006.00000000.1849428437.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3694892536.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ocsp.quovadisoffshore.com0 |
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3681957337.0000027310CA5000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1991269822.0000027310C9E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3122932540.0000027310CA4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.comSRD1- |
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comSRD13 |
Source: svchost.exe, 00000007.00000002.3710184662.000001C25487D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1854630671.000001C25487D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://spclient.wg.spotify.com/v1/live-tile-xml?region= |
Source: svchost.exe, 00000007.00000002.3680147591.000001C253E43000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.cn/shellRESP |
Source: svchost.exe, 00000007.00000002.3680147591.000001C253E43000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com/shell |
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.dr | String found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAAA2HYHBNF6KtGfOq6LmRDRnRsE0C1NizUPB%2b9TW%2b0Tv9LLJ |
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.dr | String found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAABApC73HrwE9gKV%2f4KYF6Kztns9Qz6WwYIs10FB2fwJYW985N |
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.dr | String found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAABke4skwiuYfe49X%2f7MqWUvS4wAMAkNCdvIJKn2T%2fzGuskS |
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.dr | String found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAACt0b4o2pzQr1ELEoEWZ1n5e%2fjr1V5ATEwWpquZtZOnf%2bYC |
Source: svchost.exe, 0000002A.00000002.3732021382.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997217968.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.com |
Source: svchost.exe, 0000002A.00000002.3732021382.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997217968.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.com.com |
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3725685333.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1998134965.0000027312200000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1996163246.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3737548261.0000027312200000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.comSRD1# |
Source: svchost.exe, 0000002A.00000003.3120063713.0000027311D4D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120212964.0000027311D4F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1996163246.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120999826.0000027311D63000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3121060601.0000027311D65000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1993155866.0000027311800000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3741937602.0000027312323000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120297979.0000027311D53000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119200705.0000027311D46000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3715415088.0000027311800000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119901157.0000027311D4B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120816818.0000027311D60000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119813685.0000027311D48000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119103835.0000027311D44000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3121525964.0000027311D6C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3122326950.0000027311D70000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.office.com/pwaimages |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F277CB0 memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,CreateToolhelp32Snapshot,memset,OutputDebugStringW,Module32FirstW,memset,memset,OutputDebugStringW,memset,OutputDebugStringW,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memcmp,memcmp,memcmp,memset,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,Module32NextW,memset,OutputDebugStringW,NtClose,memset,OutputDebugStringW, | 0_2_00007FF77F277CB0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F27A5A0 memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,NtOpenFile,memset,memset,OutputDebugStringW,OutputDebugStringW,NtCreateSection,memset,memset,OutputDebugStringW,OutputDebugStringW,GetCurrentProcess,NtMapViewOfSection,NtClose, | 0_2_00007FF77F27A5A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5E3110 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError, | 2_2_000001E9EC5E3110 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5E8500 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError, | 2_2_000001E9EC5E8500 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5E8620 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,GetModuleHandleW,FormatMessageW,GetLastError, | 2_2_000001E9EC5E8620 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99ADA350 memcpy,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,NtOpenFile,memset,memset,OutputDebugStringW,OutputDebugStringW,NtCreateSection,memset,memset,OutputDebugStringW,OutputDebugStringW,GetCurrentProcess,NtMapViewOfSection,NtClose, | 2_2_00007FFE99ADA350 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AF8620 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,GetModuleHandleW,FormatMessageW,GetLastError, | 2_2_00007FFE99AF8620 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F282840 | 0_2_00007FF77F282840 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F2752D0 | 0_2_00007FF77F2752D0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F277CB0 | 0_2_00007FF77F277CB0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F274D10 | 0_2_00007FF77F274D10 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F271350 | 0_2_00007FF77F271350 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F277340 | 0_2_00007FF77F277340 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F2721C0 | 0_2_00007FF77F2721C0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F272DB0 | 0_2_00007FF77F272DB0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F2769B0 | 0_2_00007FF77F2769B0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F27A5A0 | 0_2_00007FF77F27A5A0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3C75D0 | 0_2_00007FF77F3C75D0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A2860 | 0_2_00007FF77F3A2860 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3CDA70 | 0_2_00007FF77F3CDA70 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A2280 | 0_2_00007FF77F3A2280 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A1620 | 0_2_00007FF77F3A1620 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3C7A30 | 0_2_00007FF77F3C7A30 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A2040 | 0_2_00007FF77F3A2040 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A0C50 | 0_2_00007FF77F3A0C50 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A1AE0 | 0_2_00007FF77F3A1AE0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A2510 | 0_2_00007FF77F3A2510 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A0F10 | 0_2_00007FF77F3A0F10 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A02A0 | 0_2_00007FF77F3A02A0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3B8CD0 | 0_2_00007FF77F3B8CD0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F283CE0 | 0_2_00007FF77F283CE0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F2830E0 | 0_2_00007FF77F2830E0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F39FD60 | 0_2_00007FF77F39FD60 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A1D70 | 0_2_00007FF77F3A1D70 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3AFF70 | 0_2_00007FF77F3AFF70 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F282B80 | 0_2_00007FF77F282B80 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A0940 | 0_2_00007FF77F3A0940 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3BE5E0 | 0_2_00007FF77F3BE5E0 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F39F410 | 0_2_00007FF77F39F410 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3A1210 | 0_2_00007FF77F3A1210 |
Source: C:\Users\user\Desktop\dropper.exe | Code function: 0_2_00007FF77F3C3010 | 0_2_00007FF77F3C3010 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DD120 | 2_2_000001E9EC5DD120 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5E9510 | 2_2_000001E9EC5E9510 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C4D10 | 2_2_000001E9EC5C4D10 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C7340 | 2_2_000001E9EC5C7340 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DF6E0 | 2_2_000001E9EC5DF6E0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D34E0 | 2_2_000001E9EC5D34E0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DDAD0 | 2_2_000001E9EC5DDAD0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D54D0 | 2_2_000001E9EC5D54D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C52D0 | 2_2_000001E9EC5C52D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DF100 | 2_2_000001E9EC5DF100 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D5900 | 2_2_000001E9EC5D5900 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5F8AF0 | 2_2_000001E9EC5F8AF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D1AF0 | 2_2_000001E9EC5D1AF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5CCAF0 | 2_2_000001E9EC5CCAF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D31A0 | 2_2_000001E9EC5D31A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5F1F90 | 2_2_000001E9EC5F1F90 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DDD90 | 2_2_000001E9EC5DDD90 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DF390 | 2_2_000001E9EC5DF390 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D7390 | 2_2_000001E9EC5D7390 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DD7C0 | 2_2_000001E9EC5DD7C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C21C0 | 2_2_000001E9EC5C21C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C69B0 | 2_2_000001E9EC5C69B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C2DB0 | 2_2_000001E9EC5C2DB0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DE960 | 2_2_000001E9EC5DE960 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D0F60 | 2_2_000001E9EC5D0F60 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5F8F50 | 2_2_000001E9EC5F8F50 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C1350 | 2_2_000001E9EC5C1350 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5F2B80 | 2_2_000001E9EC5F2B80 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5E8620 | 2_2_000001E9EC5E8620 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D7610 | 2_2_000001E9EC5D7610 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DCBE0 | 2_2_000001E9EC5DCBE0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5CE600 | 2_2_000001E9EC5CE600 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DEBF0 | 2_2_000001E9EC5DEBF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DE4A0 | 2_2_000001E9EC5DE4A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5F8690 | 2_2_000001E9EC5F8690 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5F3090 | 2_2_000001E9EC5F3090 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DE090 | 2_2_000001E9EC5DE090 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DC290 | 2_2_000001E9EC5DC290 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5FA4C0 | 2_2_000001E9EC5FA4C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5DEEC0 | 2_2_000001E9EC5DEEC0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D64B0 | 2_2_000001E9EC5D64B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5CA4B0 | 2_2_000001E9EC5CA4B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5C7CB0 | 2_2_000001E9EC5C7CB0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5D7860 | 2_2_000001E9EC5D7860 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5F5670 | 2_2_000001E9EC5F5670 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_000001E9EC5CF870 | 2_2_000001E9EC5CF870 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AD21C0 | 2_2_00007FFE99AD21C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AE0F60 | 2_2_00007FFE99AE0F60 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AD1350 | 2_2_00007FFE99AD1350 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99ADA350 | 2_2_00007FFE99ADA350 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AD7340 | 2_2_00007FFE99AD7340 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AE1AF0 | 2_2_00007FFE99AE1AF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AD52D0 | 2_2_00007FFE99AD52D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AD4D10 | 2_2_00007FFE99AD4D10 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AE64B0 | 2_2_00007FFE99AE64B0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEEBF0 | 2_2_00007FFE99AEEBF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AECBE0 | 2_2_00007FFE99AECBE0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AED7C0 | 2_2_00007FFE99AED7C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AF8620 | 2_2_00007FFE99AF8620 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEE960 | 2_2_00007FFE99AEE960 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AE31A0 | 2_2_00007FFE99AE31A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEDD90 | 2_2_00007FFE99AEDD90 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEF390 | 2_2_00007FFE99AEF390 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AFBD90 | 2_2_00007FFE99AFBD90 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99B01F90 | 2_2_00007FFE99B01F90 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99B02B80 | 2_2_00007FFE99B02B80 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEF6E0 | 2_2_00007FFE99AEF6E0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEDAD0 | 2_2_00007FFE99AEDAD0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AE54D0 | 2_2_00007FFE99AE54D0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEEEC0 | 2_2_00007FFE99AEEEC0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99B0A4C0 | 2_2_00007FFE99B0A4C0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AED120 | 2_2_00007FFE99AED120 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99B08AF0 | 2_2_00007FFE99B08AF0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEF100 | 2_2_00007FFE99AEF100 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AE5900 | 2_2_00007FFE99AE5900 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AE7860 | 2_2_00007FFE99AE7860 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEE4A0 | 2_2_00007FFE99AEE4A0 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEE090 | 2_2_00007FFE99AEE090 |
Source: C:\Windows\System32\cmd.exe | Code function: 2_2_00007FFE99AEC290 | 2_2_00007FFE99AEC290 |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.dr | Binary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeD |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.dr | Binary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exed |
Source: System.evtx.20.dr | Binary string: C:\Device\HarddiskVolume4K |
Source: System.evtx.20.dr | Binary string: \\?\Volume{cb7fdaf7-d8ae-4a24-98ab-ca007942ac33}\Device\HarddiskVolume1m |
Source: Microsoft-Windows-SMBServer%4Operational.evtx.20.dr | Binary string: \Device\NetbiosSmb |
Source: Microsoft-Windows-SMBServer%4Operational.evtx.20.dr | Binary string: computer WORKGROUP:\Device\NetBT_Tcpip_{68C65ED0-D5FC-471F-BF0F-95C04D2E3B08} |
Source: System.evtx.20.dr | Binary string: \Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.20.dr | Binary string: \\?\Volume{cb7fdaf7-d8ae-4a24-98ab-ca007942ac33}\Device\HarddiskVolume1an |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.dr | Binary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.20.dr | Binary string: J\Device\HarddiskVolume4\Program Files (x86)\Joebox\driver\joeboxdriver.sys |
Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.20.dr | Binary string: C:\Device\HarddiskVolume4 |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.dr | Binary string: 1\Device\HarddiskVolume4\Windows\System32\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exe |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.dr | Binary string: 1\Device\HarddiskVolume4\Windows\System32\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeo |
Source: System.evtx.20.dr | Binary string: \\?\Volume{cb7fdaf7-d8ae-4a24-98ab-ca007942ac33}\Device\HarddiskVolume1iceV |
Source: Security.evtx.20.dr | Binary string: \Device\HarddiskVolume4\Program Files (x86)\Joebox\driver\joeboxdriver.sys |
Source: System.evtx.20.dr | Binary string: .\Device\HarddiskVolume2\EFI\Microsoft\Boot\BCD~ |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.dr | Binary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeo |
Source: Security.evtx.20.dr | Binary string: \Device\HarddiskVolume4\Windows\System32\drivers\filetrace.sysrit |
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.20.dr | Binary string: >\Device\HarddiskVolume4\Windows\System32\drivers\filetrace.sys |
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.dr | Binary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeT_AH** |
Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.20.dr | Binary string: :\Device\NetBT_Tcpip_{68C65ED0-D5FC-471F-BF0F-95C04D2E3B08} |
Source: System.evtx.20.dr | Binary string: \Device\HarddiskVolume4\Windows\SysWOW64\tzutil.exeL |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errorWt source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dropper.pdb source: dropper.exe |
Source: | Binary string: *@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errornp source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE709.tmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdbTCDE&@ source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991 source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE703.tmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: dll.pdb( source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: WINWORD1.PDBwinload_prod.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp |
Source: lsass.exe, 00000006.00000000.1848773496.000001D5A0CA8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicshutdownNT SERVICE |
Source: svchost.exe, 00000014.00000000.1918128496.0000024472040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3681342964.0000024472040000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor |
Source: lsass.exe, 00000006.00000000.1848773496.000001D5A0CA8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicvssNT SERVICE |
Source: svchost.exe, 00000007.00000000.1854366097.000001C254800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicshutdown |
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicvss |
Source: svchost.exe, 0000000A.00000000.1861897146.0000020295213000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3732406775.0000020295213000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3733618857.0000023DCECDA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.1964395015.0000023DCECDA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.1964042058.0000023DCEC24000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3730778928.0000023DCEC24000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.3676836230.0000020206832000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974262335.0000020206832000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000020.00000002.3672044851.00000176A2C00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc |
Source: lsass.exe, 00000006.00000000.1848773496.000001D5A0CA8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicheartbeatNT SERVICE |
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@vmicshutdown |
Source: svchost.exe, 0000000A.00000000.1861942504.000002029522A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3732882937.000002029522A000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW` |
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @vmicshutdown |
Source: lsass.exe, 00000006.00000000.1848541761.000001D5A0C13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3671476740.000001D5A0C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000000.1865068592.0000017A4FA13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.3670300175.0000017A4FA13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000000.1902839830.0000023624C29000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.3671063709.0000023624C29000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.3674201539.0000021074A2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000000.1905255624.0000021074A2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1918128496.0000024472040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3681342964.0000024472040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1928161645.000002624BA5A000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @vmicheartbeat |
Source: svchost.exe, 00000007.00000000.1854366097.000001C254800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmicheartbeat |
Source: C:\Users\user\Desktop\dropper.exe | Memory written: C:\Windows\System32\cmd.exe base: 1E9EA1F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\winlogon.exe base: 22EA0F30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\lsass.exe base: 1D5A12C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C2547E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\fontdrvhost.exe base: 2D165ED0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\fontdrvhost.exe base: 15A02590000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 202954F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 17A4FD10000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\dwm.exe base: 203C25A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 210B17B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 23625470000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 210752F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHDCPSvc.exe base: 20132040000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 25A61170000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 15B925D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E527CD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 24471FF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2624C1F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A512710000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHeciSvc.exe base: 13C98A30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxCUIService.exe base: 1A7C60C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 15A415E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2B8023E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 16F945E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 18130BF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 18A357F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 176A39A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 26D9CBF0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 23DCEBE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C21B810000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2B6742F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 20207560000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 20C362C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 202DE5C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 23332A00000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 24D9AC90000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 273114F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2E2D45A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\spoolsv.exe base: 380000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FF66FA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D388F80000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2BBDEF30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E8AD970000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 21FEF4C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C4DAF90000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2008E430000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CE82070000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1620F440000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_78ff17a5ea060c5f\OneApp.IGCC.WinService.exe base: 1F32D400000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_ffc75848a6342fdf\jhi_service.exe base: 1B09BCE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 15BF5370000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 246D20C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 21290350000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D861D60000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 24F383E0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 25D417C0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\sihost.exe base: 280B6990000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FD0F310000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E374BA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe base: 700000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CBDEC80000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F1A68B0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 20DCEFE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 1D2EDCD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\explorer.exe base: 9E30000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxEM.exe base: 2A1B2970000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 24274250000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: 2E75E930000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1E4E89D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: 210C33F0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 18035870000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1FBC6F10000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2382AEB0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\SettingSyncHost.exe base: 1C79D3A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 21DEAFD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 14DFF1A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\dllhost.exe base: 1CD12040000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe base: 204BDDA0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\audiodg.exe base: 1DA251A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 27DD4FC0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 1F217020000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe base: 4D0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 1BA63E20000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 175748A0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 282CAFC0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 279ECD60000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 255D5AD0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 2266FBE0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\svchost.exe base: 23236FC0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 2BB0000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Memory written: C:\Windows\System32\conhost.exe base: 28438CA0000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 20295500000 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Queries volume information: C:\Windows\Temp\tempdll.dll VolumeInformation | Jump to behavior |