Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000033.00000000.2173514506.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B87641000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000033.00000000.2173514506.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B87641000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: driver.exe, 0000001A.00000003.2145145649.000001F307E70000.00000004.00000001.00020000.00000000.sdmp, ftnvuqwjtdwb.sys.26.dr |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorb source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ~1.PDB @ source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: lsass.exe, 0000001B.00000002.3380812837.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://3csp.icrosof4m/ocp0 |
Source: dialer.exe, 0000002D.00000002.3378194513.0000021C6D165000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.php |
Source: dialer.exe, 0000002D.00000002.3378194513.0000021C6D165000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.php)L |
Source: dialer.exe, 0000002D.00000002.3378194513.0000021C6D165000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.php--c |
Source: dialer.exe, 0000002D.00000002.3378194513.0000021C6D165000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.phpaL( |
Source: dialer.exe, 0000002D.00000003.2147213918.0000021C6D181000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.phpldn |
Source: dialer.exe, 0000002D.00000002.3378194513.0000021C6D180000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.phpo |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: lsass.exe, 0000001B.00000000.2122711438.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378985480.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3382338563.00000140AE19F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2123167381.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: driver.exe, 0000001A.00000003.2145145649.000001F307E70000.00000004.00000001.00020000.00000000.sdmp, ftnvuqwjtdwb.sys.26.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: driver.exe, 0000001A.00000003.2145145649.000001F307E70000.00000004.00000001.00020000.00000000.sdmp, ftnvuqwjtdwb.sys.26.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: driver.exe, 0000001A.00000003.2145145649.000001F307E70000.00000004.00000001.00020000.00000000.sdmp, ftnvuqwjtdwb.sys.26.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: driver.exe, 0000001A.00000003.2145145649.000001F307E70000.00000004.00000001.00020000.00000000.sdmp, ftnvuqwjtdwb.sys.26.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: lsass.exe, 0000001B.00000000.2122711438.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378985480.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3382338563.00000140AE19F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2123167381.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3382338563.00000140AE19F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: lsass.exe, 0000001B.00000000.2122711438.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378985480.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3382338563.00000140AE19F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2123167381.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 0000001B.00000002.3373903281.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 0000001B.00000002.3373903281.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: lsass.exe, 0000001B.00000000.2121952764.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: lsass.exe, 0000001B.00000002.3372519545.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2121998643.00000140AD850000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: lsass.exe, 0000001B.00000000.2121952764.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122711438.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378985480.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3382338563.00000140AE19F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3382338563.00000140AE19F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2123167381.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0I |
Source: lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3382338563.00000140AE19F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2417098899.00000140AE172000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: svchost.exe, 00000035.00000002.3378496559.000001A204EE0000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: lsass.exe, 0000001B.00000000.2121952764.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: lsass.exe, 0000001B.00000000.2121952764.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: lsass.exe, 0000001B.00000002.3372519545.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2121952764.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2121998643.00000140AD850000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: lsass.exe, 0000001B.00000000.2121952764.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties |
Source: lsass.exe, 0000001B.00000002.3372045209.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: lsass.exe, 0000001B.00000000.2123167381.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2123167381.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122868011.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3378242956.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3383068124.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122957095.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2122637141.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: dialer.exe, 0000002D.00000002.3359712073.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://172.94.1q |
Source: dialer.exe, 0000002D.00000002.3359712073.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF749F43B60 | 0_2_00007FF749F43B60 |
Source: C:\Windows\System32\dialer.exe | Code function: 14_2_000000014000226C | 14_2_000000014000226C |
Source: C:\Windows\System32\dialer.exe | Code function: 14_2_00000001400014D8 | 14_2_00000001400014D8 |
Source: C:\Windows\System32\dialer.exe | Code function: 14_2_0000000140002560 | 14_2_0000000140002560 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E858951F2C | 21_2_000001E858951F2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E8589638A8 | 21_2_000001E8589638A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E85895D0E0 | 21_2_000001E85895D0E0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E858982B2C | 21_2_000001E858982B2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E8589944A8 | 21_2_000001E8589944A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E85898DCE0 | 21_2_000001E85898DCE0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E8589B1F2C | 21_2_000001E8589B1F2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E8589C38A8 | 21_2_000001E8589C38A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E8589BD0E0 | 21_2_000001E8589BD0E0 |
Source: C:\ProgramData\IGaming\driver.exe | Code function: 26_2_00007FF7F4F23B60 | 26_2_00007FF7F4F23B60 |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140ADFC1F2C | 27_2_00000140ADFC1F2C |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140ADFCD0E0 | 27_2_00000140ADFCD0E0 |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140ADFD38A8 | 27_2_00000140ADFD38A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140AE86DCE0 | 27_2_00000140AE86DCE0 |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140AE8744A8 | 27_2_00000140AE8744A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140AE862B2C | 27_2_00000140AE862B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD59D0E0 | 30_2_00000195DD59D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD5A38A8 | 30_2_00000195DD5A38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD591F2C | 30_2_00000195DD591F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD5CDCE0 | 30_2_00000195DD5CDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD5D44A8 | 30_2_00000195DD5D44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD5C2B2C | 30_2_00000195DD5C2B2C |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160C9E1F2C | 31_2_000001160C9E1F2C |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160C9ED0E0 | 31_2_000001160C9ED0E0 |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160C9F38A8 | 31_2_000001160C9F38A8 |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160CA12B2C | 31_2_000001160CA12B2C |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160CA1DCE0 | 31_2_000001160CA1DCE0 |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160CA244A8 | 31_2_000001160CA244A8 |
Source: C:\Windows\System32\dialer.exe | Code function: 42_2_000000014000226C | 42_2_000000014000226C |
Source: C:\Windows\System32\dialer.exe | Code function: 42_2_00000001400014D8 | 42_2_00000001400014D8 |
Source: C:\Windows\System32\dialer.exe | Code function: 42_2_0000000140002560 | 42_2_0000000140002560 |
Source: C:\Windows\System32\dialer.exe | Code function: 44_2_0000000140003160 | 44_2_0000000140003160 |
Source: C:\Windows\System32\dialer.exe | Code function: 44_2_00000001400026E0 | 44_2_00000001400026E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E10838A8 | 46_2_00000257E10838A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E107D0E0 | 46_2_00000257E107D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E1071F2C | 46_2_00000257E1071F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E10B44A8 | 46_2_00000257E10B44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E10ADCE0 | 46_2_00000257E10ADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E10A2B2C | 46_2_00000257E10A2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C1E38A8 | 47_2_000001F28C1E38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C1DD0E0 | 47_2_000001F28C1DD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C1D1F2C | 47_2_000001F28C1D1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C9444A8 | 47_2_000001F28C9444A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C93DCE0 | 47_2_000001F28C93DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C932B2C | 47_2_000001F28C932B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA97FD1F2C | 48_2_000001CA97FD1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA97FDD0E0 | 48_2_000001CA97FDD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA97FE38A8 | 48_2_000001CA97FE38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA98542B2C | 48_2_000001CA98542B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA9854DCE0 | 48_2_000001CA9854DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA985544A8 | 48_2_000001CA985544A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D2652F38A8 | 49_2_000001D2652F38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D2652ED0E0 | 49_2_000001D2652ED0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D2652E1F2C | 49_2_000001D2652E1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D2653244A8 | 49_2_000001D2653244A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D26531DCE0 | 49_2_000001D26531DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D26532AEC2 | 49_2_000001D26532AEC2 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D265312B2C | 49_2_000001D265312B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 50_2_00000254A27D2B2C | 50_2_00000254A27D2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 50_2_00000254A27E44A8 | 50_2_00000254A27E44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 50_2_00000254A27DDCE0 | 50_2_00000254A27DDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 51_2_0000024B87DDDCE0 | 51_2_0000024B87DDDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 51_2_0000024B87DE44A8 | 51_2_0000024B87DE44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 51_2_0000024B87DD2B2C | 51_2_0000024B87DD2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FB3CD0E0 | 52_2_00000205FB3CD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FB3D38A8 | 52_2_00000205FB3D38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FB3C1F2C | 52_2_00000205FB3C1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FD402B2C | 52_2_00000205FD402B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FD4144A8 | 52_2_00000205FD4144A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FD40DCE0 | 52_2_00000205FD40DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001A2056A2B2C | 53_2_000001A2056A2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001A2056ADCE0 | 53_2_000001A2056ADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001A2056B44A8 | 53_2_000001A2056B44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F3D0E0 | 54_2_0000018EC1F3D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F438A8 | 54_2_0000018EC1F438A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F31F2C | 54_2_0000018EC1F31F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F6DCE0 | 54_2_0000018EC1F6DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F744A8 | 54_2_0000018EC1F744A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F62B2C | 54_2_0000018EC1F62B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3BCD0E0 | 55_2_0000025CE3BCD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3BD38A8 | 55_2_0000025CE3BD38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3BC1F2C | 55_2_0000025CE3BC1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3E0DCE0 | 55_2_0000025CE3E0DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3E144A8 | 55_2_0000025CE3E144A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3E02B2C | 55_2_0000025CE3E02B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_0000026238951F2C | 56_2_0000026238951F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_00000262389638A8 | 56_2_00000262389638A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_000002623895D0E0 | 56_2_000002623895D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_0000026238982B2C | 56_2_0000026238982B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_00000262389944A8 | 56_2_00000262389944A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_000002623898DCE0 | 56_2_000002623898DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E561F2C | 57_2_000002786E561F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E56D0E0 | 57_2_000002786E56D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E5738A8 | 57_2_000002786E5738A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E592B2C | 57_2_000002786E592B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E59DCE0 | 57_2_000002786E59DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E5A44A8 | 57_2_000002786E5A44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FF7D0E0 | 58_2_000001611FF7D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FF838A8 | 58_2_000001611FF838A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FF71F2C | 58_2_000001611FF71F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FFADCE0 | 58_2_000001611FFADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FFB44A8 | 58_2_000001611FFB44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FFA2B2C | 58_2_000001611FFA2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F3638A8 | 59_2_0000027C0F3638A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F35D0E0 | 59_2_0000027C0F35D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F351F2C | 59_2_0000027C0F351F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F3944A8 | 59_2_0000027C0F3944A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F38DCE0 | 59_2_0000027C0F38DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F382B2C | 59_2_0000027C0F382B2C |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "LightService" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "LightService" binpath= "C:\ProgramData\IGaming\driver.exe" start= "auto" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "LightService" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\ProgramData\IGaming\driver.exe C:\ProgramData\IGaming\driver.exe | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\dialer.exe dialer.exe | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "LightService" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "LightService" binpath= "C:\ProgramData\IGaming\driver.exe" start= "auto" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "LightService" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Process created: C:\Windows\System32\dialer.exe dialer.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\ProgramData\IGaming\driver.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: napinsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wshbth.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: nlaapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: winrnr.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000033.00000000.2173514506.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B87641000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000033.00000000.2173514506.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B87641000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: driver.exe, 0000001A.00000003.2145145649.000001F307E70000.00000004.00000001.00020000.00000000.sdmp, ftnvuqwjtdwb.sys.26.dr |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorb source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ~1.PDB @ source: svchost.exe, 00000033.00000000.2173514506.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3368381949.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2173436542.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3367839566.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000033.00000002.3369152171.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2173615180.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2504 | Thread sleep count: 5991 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1960 | Thread sleep count: 3829 > 30 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5384 | Thread sleep time: -8301034833169293s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 3292 | Thread sleep count: 8510 > 30 | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 3292 | Thread sleep time: -8510000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 3292 | Thread sleep count: 1488 > 30 | Jump to behavior |
Source: C:\Windows\System32\winlogon.exe TID: 3292 | Thread sleep time: -1488000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\lsass.exe TID: 6220 | Thread sleep count: 9928 > 30 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe TID: 6220 | Thread sleep time: -9928000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2884 | Thread sleep count: 7178 > 30 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6448 | Thread sleep count: 2346 > 30 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2680 | Thread sleep time: -6456360425798339s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5616 | Thread sleep count: 247 > 30 | Jump to behavior |
Source: C:\Windows\System32\svchost.exe TID: 5616 | Thread sleep time: -247000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\dwm.exe TID: 2944 | Thread sleep count: 9874 > 30 | Jump to behavior |
Source: C:\Windows\System32\dwm.exe TID: 2944 | Thread sleep time: -9874000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\dialer.exe TID: 6132 | Thread sleep count: 1803 > 30 | |
Source: C:\Windows\System32\dialer.exe TID: 6132 | Thread sleep time: -180300s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1976 | Thread sleep count: 254 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1976 | Thread sleep time: -254000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 432 | Thread sleep count: 255 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 432 | Thread sleep time: -255000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 4068 | Thread sleep count: 255 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 4068 | Thread sleep time: -255000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2608 | Thread sleep count: 254 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2608 | Thread sleep time: -254000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6480 | Thread sleep count: 201 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6480 | Thread sleep time: -201000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2752 | Thread sleep count: 254 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2752 | Thread sleep time: -254000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1412 | Thread sleep count: 239 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1412 | Thread sleep time: -239000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6432 | Thread sleep count: 248 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6432 | Thread sleep time: -248000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 6048 | Thread sleep count: 241 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 6048 | Thread sleep time: -241000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 1960 | Thread sleep count: 255 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 1960 | Thread sleep time: -255000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5588 | Thread sleep count: 236 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5588 | Thread sleep time: -236000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 3920 | Thread sleep count: 254 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 3920 | Thread sleep time: -254000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 5812 | Thread sleep count: 255 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 5812 | Thread sleep time: -255000s >= -30000s | |
Source: C:\Windows\System32\svchost.exe TID: 2716 | Thread sleep count: 254 > 30 | |
Source: C:\Windows\System32\svchost.exe TID: 2716 | Thread sleep time: -254000s >= -30000s | |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dwm.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dwm.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.52.dr | Binary or memory string: VMware Virtual disk 2.0 6000c292b65879ff477a6af604113f58PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS |
Source: Microsoft-Windows-Partition%4Diagnostic.evtx.52.dr | Binary or memory string: VMwareVirtual disk2.06000c292b65879ff477a6af604113f58PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00 |
Source: svchost.exe, 00000034.00000000.2178476361.00000205FAC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000034.00000002.3376207799.00000205FAC2B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor |
Source: lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicvssNT SERVICE |
Source: svchost.exe, 00000034.00000000.2178508976.00000205FAC43000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: (@vmci |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: VMware SATA CD00 |
Source: svchost.exe, 00000032.00000002.3392383683.00000254A2FDA000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: NECVMWarVMware SATA CD00 |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a |
Source: dialer.exe, 0000002D.00000002.3378194513.0000021C6D180000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000034.00000000.2183063878.00000205FBA00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8 |
Source: dwm.exe, 0000001F.00000002.3403437969.0000011607ED0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: PointVMware&P |
Source: dwm.exe, 0000001F.00000002.3403437969.0000011607ED0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000= |
Source: Microsoft-Windows-Partition%4Diagnostic.evtx.52.dr | Binary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00 |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: storahciNECVMWarVMware SATA CD00 |
Source: svchost.exe, 00000034.00000000.2183063878.00000205FBA00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap |
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.52.dr | Binary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.52.dr | Binary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value) |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: LSI_SASVMware Virtual disk 6000c292b65879ff477a6af604113f58 |
Source: lsass.exe, 0000001B.00000000.2121920051.00000140AD813000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3371581658.00000140AD813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000002.3369748191.00000195DD613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000000.2125470026.00000195DD613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.2152084537.000001F28C22B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.3369193733.000001F28C22B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2153856421.000001CA9782A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000002.3365054006.000001CA9782A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2164109329.00000254A2043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3372629205.00000254A2043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000034.00000000.2178476361.00000205FAC2B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: dwm.exe, 0000001F.00000002.3403437969.0000011607ED0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: System.evtx.52.dr | Binary or memory string: VMCI: Using capabilities (0x1c). |
Source: lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicshutdownNT SERVICE |
Source: svchost.exe, 00000034.00000000.2178331436.00000205FABB0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c292b65879ff477a6af604113f58 |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.52.dr | Binary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value) |
Source: svchost.exe, 00000034.00000000.2183063878.00000205FBA00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c292b65879ff477a6af604113f588 |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: nonicNECVMWarVMware SATA CD00 |
Source: svchost.exe, 00000034.00000000.2183063878.00000205FBA00000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@ |
Source: svchost.exe, 00000034.00000003.2239849466.00000205FB933000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: vmcir:m |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.52.dr | Binary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value) |
Source: svchost.exe, 00000034.00000002.3401813667.00000205FBFA5000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 7-4vmci |
Source: svchost.exe, 0000001E.00000000.2125611374.00000195DD66A000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: svchost.exe, 00000030.00000002.3364015684.000001CA97800000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc |
Source: lsass.exe, 0000001B.00000000.2122141328.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: pvmicheartbeatNT SERVICE |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: VMware |
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.52.dr | Binary or memory string: nonicVMware Virtual disk 6000c292b65879ff477a6af604113f58 |
Source: dialer.exe, 0000002D.00000002.3378194513.0000021C6D129000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW j |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.52.dr | Binary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter')) |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.52.dr | Binary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware')) |
Source: Microsoft-Windows-PowerShell%4Operational.evtx.52.dr | Binary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD')) |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF749F41160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 0_2_00007FF749F41160 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E858987D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 21_2_000001E858987D90 |
Source: C:\Windows\System32\winlogon.exe | Code function: 21_2_000001E85898D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 21_2_000001E85898D2A4 |
Source: C:\ProgramData\IGaming\driver.exe | Code function: 26_2_00007FF7F4F21160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 26_2_00007FF7F4F21160 |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140AE867D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 27_2_00000140AE867D90 |
Source: C:\Windows\System32\lsass.exe | Code function: 27_2_00000140AE86D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 27_2_00000140AE86D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD5CD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_00000195DD5CD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 30_2_00000195DD5C7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 30_2_00000195DD5C7D90 |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160CA1D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_000001160CA1D2A4 |
Source: C:\Windows\System32\dwm.exe | Code function: 31_2_000001160CA17D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 31_2_000001160CA17D90 |
Source: C:\Windows\System32\dialer.exe | Code function: 44_2_0000000140001160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 44_2_0000000140001160 |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E10AD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 46_2_00000257E10AD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 46_2_00000257E10A7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 46_2_00000257E10A7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C937D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 47_2_000001F28C937D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 47_2_000001F28C93D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 47_2_000001F28C93D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA9854D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 48_2_000001CA9854D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 48_2_000001CA98547D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 48_2_000001CA98547D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D265317D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 49_2_000001D265317D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 49_2_000001D26531D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 49_2_000001D26531D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 50_2_00000254A27DD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 50_2_00000254A27DD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 50_2_00000254A27D7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 50_2_00000254A27D7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 51_2_0000024B87DDD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 51_2_0000024B87DDD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 51_2_0000024B87DD7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 51_2_0000024B87DD7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FD40D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 52_2_00000205FD40D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 52_2_00000205FD407D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 52_2_00000205FD407D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001A2056AD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 53_2_000001A2056AD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 53_2_000001A2056A7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 53_2_000001A2056A7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F67D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 54_2_0000018EC1F67D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 54_2_0000018EC1F6D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 54_2_0000018EC1F6D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3E0D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 55_2_0000025CE3E0D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 55_2_0000025CE3E07D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 55_2_0000025CE3E07D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_000002623898D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 56_2_000002623898D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 56_2_0000026238987D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 56_2_0000026238987D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E597D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 57_2_000002786E597D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 57_2_000002786E59D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 57_2_000002786E59D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FFAD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 58_2_000001611FFAD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 58_2_000001611FFA7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 58_2_000001611FFA7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F38D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 59_2_0000027C0F38D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 59_2_0000027C0F387D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 59_2_0000027C0F387D90 |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 1E858950000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 140ADFC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 195DD590000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 1160C9B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 1E8589B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 140AE890000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 195DE1A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 1160C9E0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 257E1070000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F28C1D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1CA97FD0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D2652E0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 254A27A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 24B87DA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 205FB3C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A205670000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 18EC1F30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 25CE3BC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26238950000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2786E560000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1611FF70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 27C0F350000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1B279570000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1E70A460000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22D13110000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22C8C580000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2825F1D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 20BAEC90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1C782530000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\spoolsv.exe base: A60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 24066EB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 181CEDB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2A142790000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 195B6F30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1428DCA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973730000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1DBF9DB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D76CCC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A239D90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 17CFA390000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23FB7270000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1DF53B50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 164E88A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 25177B50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28D5D340000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\sihost.exe base: 24EB5E10000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 20859990000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F153C20000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D241D40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 16FADAD0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ctfmon.exe base: 20E03070000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 15204DB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\explorer.exe base: 11C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 175C5280000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22EF1B30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 261DE4D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 22E74520000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\smartscreen.exe base: 226D8930000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 13E5E930000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 27234C50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28543540000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\audiodg.exe base: 2B684340000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1CE69900000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 29283380000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 193FA700000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1CBD1BD0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28A84D30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 28571390000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2551B760000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 20C383F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 20C38E60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\winlogon.exe EIP: 5895273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\lsass.exe EIP: ADFC273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: DD59273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 589B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AE89273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DE1A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C9E273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: E107273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 8C1D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 97FD273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 652E273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: A27A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 87DA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: FB3C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 567273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: C1F3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: E3BC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 3895273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 6E56273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 1FF7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: F35273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7957273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A46273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1311273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8C58273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5F1D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5D9C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AEC9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DC1B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8253273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A6273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 66EB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FD9A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: CEDB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4279273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: B6F3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8DCA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7373273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F9DB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6CCC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 39D9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FA39273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: B727273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 53B5273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: E88A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 77B5273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5D34273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: B5E1273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5999273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 53C2273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 41D4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: ADAD273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 307273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4DB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 11C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C528273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 76AA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F1B3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F34F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DE4D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7452273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A9D0273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AF8C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D893273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5E93273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4412273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 97E3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DC87273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 698D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 34C5273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4354273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8434273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5892273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6990273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8338273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FA70273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D1BD273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 84D3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7139273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1B76273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 383F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 38E6273C | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E858950000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DD590000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160C9B0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E8589B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140AE890000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DE1A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160C9E0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257E1070000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 254A27A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A205670000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26238950000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2786E560000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1611FF70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27C0F350000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B279570000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E70A460000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22D13110000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C8C580000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20BAEC90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C782530000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: A60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24066EB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 181CEDB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A142790000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195B6F30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DCA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973730000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DBF9DB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A239D90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17CFA390000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23FB7270000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DF53B50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 164E88A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25177B50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28D5D340000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 24EB5E10000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20859990000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F153C20000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D241D40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 16FADAD0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 20E03070000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15204DB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 11C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 175C5280000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22EF1B30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 261DE4D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74520000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 226D8930000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 13E5E930000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27234C50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28543540000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\audiodg.exe base: 2B684340000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1CE69900000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 29283380000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 193FA700000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1CBD1BD0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28A84D30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 28571390000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2551B760000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 20C383F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 20C38E60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E858950000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DD590000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160C9B0000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 254A2D50000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E8589B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140AE890000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DE1A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160C9E0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257E1070000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 254A27A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A205670000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26238950000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2786E560000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1611FF70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27C0F350000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B279570000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E70A460000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22D13110000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C8C580000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20BAEC90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C782530000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: A60000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24066EB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 181CEDB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A142790000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195B6F30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DCA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973730000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DBF9DB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A239D90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17CFA390000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23FB7270000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DF53B50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 164E88A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25177B50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28D5D340000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 24EB5E10000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20859990000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F153C20000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D241D40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 16FADAD0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 20E03070000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15204DB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 11C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 175C5280000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22EF1B30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 261DE4D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74520000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 226D8930000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 13E5E930000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27234C50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28543540000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\audiodg.exe base: 2B684340000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1CE69900000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 29283380000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 193FA700000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1CBD1BD0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28A84D30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 28571390000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2551B760000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 20C383F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 20C38E60000 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformation | |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformation | |