Source: lsass.exe, 00000024.00000002.3311887155.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://3csp.icrosof4m/ocp0 |
Source: lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: lsass.exe, 00000024.00000000.2096932816.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2202391543.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2216849441.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312230976.00000140AE19D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3311544783.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: lsass.exe, 00000024.00000000.2096686797.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: lsass.exe, 00000024.00000002.3311409075.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097259456.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: Lightshot.exe, 00000025.00000003.2127811419.000002683F580000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: Lightshot.exe, 00000025.00000003.2127811419.000002683F580000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: Lightshot.exe, 00000025.00000003.2127811419.000002683F580000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: Lightshot.exe, 00000025.00000003.2127811419.000002683F580000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: lsass.exe, 00000024.00000000.2096932816.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2202391543.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2216849441.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312230976.00000140AE19D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3311544783.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: lsass.exe, 00000024.00000002.3311409075.00000140AE000000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 00000024.00000000.2096686797.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097259456.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 00000024.00000003.2202391543.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2216849441.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312230976.00000140AE19D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: lsass.exe, 00000024.00000000.2096932816.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2202391543.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2216849441.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312230976.00000140AE19D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3311544783.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: lsass.exe, 00000024.00000000.2096686797.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097259456.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: lsass.exe, 00000024.00000002.3310424215.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096686797.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: lsass.exe, 00000024.00000002.3310424215.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096686797.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: lsass.exe, 00000024.00000002.3309932846.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: lsass.exe, 00000024.00000000.2096621518.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3310067164.00000140AD850000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: lsass.exe, 00000024.00000002.3309932846.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: lsass.exe, 00000024.00000000.2096932816.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2202391543.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3311409075.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2216849441.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312230976.00000140AE19D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096686797.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3311544783.00000140AE05D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: lsass.exe, 00000024.00000003.2202391543.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2216849441.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312230976.00000140AE19D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097259456.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0I |
Source: lsass.exe, 00000024.00000003.2202391543.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000003.2216849441.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312230976.00000140AE19D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: lsass.exe, 00000024.00000002.3309932846.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: lsass.exe, 00000024.00000002.3309932846.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: lsass.exe, 00000024.00000000.2096621518.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3310067164.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3309932846.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: lsass.exe, 00000024.00000002.3309932846.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties |
Source: lsass.exe, 00000024.00000000.2096595487.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: lsass.exe, 00000024.00000000.2097259456.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097259456.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096899258.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2097055499.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000002.3312501429.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000024.00000000.2096998931.00000140AE074000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: dialer.exe, 00000041.00000002.3306534127.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://172.94.1q |
Source: dialer.exe, 00000041.00000002.3306534127.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: C:\Users\user\Desktop\gem2.exe | Code function: 0_2_00007FF72A7B65EC | 0_2_00007FF72A7B65EC |
Source: C:\Users\user\Desktop\gem2.exe | Code function: 0_2_00007FF72A7B65EC | 0_2_00007FF72A7B65EC |
Source: C:\Users\user\Desktop\gem2.exe | Code function: 0_2_00007FF72A7B65EC | 0_2_00007FF72A7B65EC |
Source: C:\Users\user\Desktop\gem2.exe | Code function: 0_2_00007FF72A7B65EC | 0_2_00007FF72A7B65EC |
Source: C:\Windows\System32\dialer.exe | Code function: 23_2_000000014000226C | 23_2_000000014000226C |
Source: C:\Windows\System32\dialer.exe | Code function: 23_2_00000001400014D8 | 23_2_00000001400014D8 |
Source: C:\Windows\System32\dialer.exe | Code function: 23_2_0000000140002560 | 23_2_0000000140002560 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E858951F2C | 29_2_000001E858951F2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E8589638A8 | 29_2_000001E8589638A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E85895D0E0 | 29_2_000001E85895D0E0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E858982B2C | 29_2_000001E858982B2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E8589944A8 | 29_2_000001E8589944A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E85898DCE0 | 29_2_000001E85898DCE0 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E8589B1F2C | 29_2_000001E8589B1F2C |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E8589C38A8 | 29_2_000001E8589C38A8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E8589BD0E0 | 29_2_000001E8589BD0E0 |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140ADFC1F2C | 36_2_00000140ADFC1F2C |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140ADFCD0E0 | 36_2_00000140ADFCD0E0 |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140ADFD38A8 | 36_2_00000140ADFD38A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140AE86DCE0 | 36_2_00000140AE86DCE0 |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140AE8744A8 | 36_2_00000140AE8744A8 |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140AE862B2C | 36_2_00000140AE862B2C |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Code function: 37_2_00007FF6E4D865EC | 37_2_00007FF6E4D865EC |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Code function: 37_2_00007FF6E4D865EC | 37_2_00007FF6E4D865EC |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Code function: 37_2_00007FF6E4D865EC | 37_2_00007FF6E4D865EC |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Code function: 37_2_00007FF6E4D865EC | 37_2_00007FF6E4D865EC |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD59D0E0 | 40_2_00000195DD59D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD5A38A8 | 40_2_00000195DD5A38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD591F2C | 40_2_00000195DD591F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD5CDCE0 | 40_2_00000195DD5CDCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD5D44A8 | 40_2_00000195DD5D44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD5C2B2C | 40_2_00000195DD5C2B2C |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBB1F2C | 41_2_000001160CBB1F2C |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBBD0E0 | 41_2_000001160CBBD0E0 |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBC38A8 | 41_2_000001160CBC38A8 |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBE2B2C | 41_2_000001160CBE2B2C |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBEDCE0 | 41_2_000001160CBEDCE0 |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBF44A8 | 41_2_000001160CBF44A8 |
Source: C:\Windows\System32\dialer.exe | Code function: 62_2_000000014000226C | 62_2_000000014000226C |
Source: C:\Windows\System32\dialer.exe | Code function: 62_2_00000001400014D8 | 62_2_00000001400014D8 |
Source: C:\Windows\System32\dialer.exe | Code function: 62_2_0000000140002560 | 62_2_0000000140002560 |
Source: C:\Windows\System32\dialer.exe | Code function: 64_2_0000000140003150 | 64_2_0000000140003150 |
Source: C:\Windows\System32\dialer.exe | Code function: 64_2_00000001400026E0 | 64_2_00000001400026E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E10838A8 | 66_2_00000257E10838A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E107D0E0 | 66_2_00000257E107D0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E1071F2C | 66_2_00000257E1071F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E10B44A8 | 66_2_00000257E10B44A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E10ADCE0 | 66_2_00000257E10ADCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E10A2B2C | 66_2_00000257E10A2B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C1E38A8 | 67_2_000001F28C1E38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C1DD0E0 | 67_2_000001F28C1DD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C1D1F2C | 67_2_000001F28C1D1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C9444A8 | 67_2_000001F28C9444A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C93DCE0 | 67_2_000001F28C93DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C932B2C | 67_2_000001F28C932B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA97FD1F2C | 68_2_000001CA97FD1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA97FDD0E0 | 68_2_000001CA97FDD0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA97FE38A8 | 68_2_000001CA97FE38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA98542B2C | 68_2_000001CA98542B2C |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA9854DCE0 | 68_2_000001CA9854DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA985544A8 | 68_2_000001CA985544A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D2652F38A8 | 69_2_000001D2652F38A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D2652ED0E0 | 69_2_000001D2652ED0E0 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D2652E1F2C | 69_2_000001D2652E1F2C |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D2653244A8 | 69_2_000001D2653244A8 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D26531DCE0 | 69_2_000001D26531DCE0 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D26532AEC2 | 69_2_000001D26532AEC2 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D265312B2C | 69_2_000001D265312B2C |
Source: unknown | Process created: C:\Users\user\Desktop\gem2.exe "C:\Users\user\Desktop\gem2.exe" | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "GeekBrains" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "GeekBrains" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\ProgramData\Screenshots\Lightshot.exe C:\ProgramData\Screenshots\Lightshot.exe | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\dialer.exe dialer.exe | |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "GeekBrains" | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto" | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | Jump to behavior |
Source: C:\Users\user\Desktop\gem2.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "GeekBrains" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Process created: C:\Windows\System32\dialer.exe dialer.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart | |
Source: C:\Users\user\Desktop\gem2.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wusa.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: dpx.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: wtsapi32.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\wusa.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: napinsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wshbth.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: nlaapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: winrnr.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\dialer.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\dialer.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\lsass.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dwm.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dwm.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\dialer.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\svchost.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\gem2.exe | Code function: 0_2_00007FF72A7B118B Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 0_2_00007FF72A7B118B |
Source: C:\Users\user\Desktop\gem2.exe | Code function: 0_2_00007FF72A7B11D8 _initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 0_2_00007FF72A7B11D8 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E858987D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 29_2_000001E858987D90 |
Source: C:\Windows\System32\winlogon.exe | Code function: 29_2_000001E85898D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 29_2_000001E85898D2A4 |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140AE867D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_00000140AE867D90 |
Source: C:\Windows\System32\lsass.exe | Code function: 36_2_00000140AE86D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_00000140AE86D2A4 |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Code function: 37_2_00007FF6E4D8118B Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 37_2_00007FF6E4D8118B |
Source: C:\ProgramData\Screenshots\Lightshot.exe | Code function: 37_2_00007FF6E4D811D8 _initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 37_2_00007FF6E4D811D8 |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD5CD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 40_2_00000195DD5CD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 40_2_00000195DD5C7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 40_2_00000195DD5C7D90 |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 41_2_000001160CBED2A4 |
Source: C:\Windows\System32\dwm.exe | Code function: 41_2_000001160CBE7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 41_2_000001160CBE7D90 |
Source: C:\Windows\System32\dialer.exe | Code function: 64_2_0000000140001160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 64_2_0000000140001160 |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E10AD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 66_2_00000257E10AD2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 66_2_00000257E10A7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 66_2_00000257E10A7D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C937D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 67_2_000001F28C937D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 67_2_000001F28C93D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 67_2_000001F28C93D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA9854D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 68_2_000001CA9854D2A4 |
Source: C:\Windows\System32\svchost.exe | Code function: 68_2_000001CA98547D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 68_2_000001CA98547D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D265317D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 69_2_000001D265317D90 |
Source: C:\Windows\System32\svchost.exe | Code function: 69_2_000001D26531D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 69_2_000001D26531D2A4 |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 1E858950000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 140ADFC0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 195DD590000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 1160CB80000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\winlogon.exe base: 1E8589B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\lsass.exe base: 140AE890000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 195DE1A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dwm.exe base: 1160CBB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 257E1070000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F28C1D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1CA97FD0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D2652E0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 254A27A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 24B87DA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 205FB3C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A205670000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 18EC1F30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 25CE3BC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 26238950000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2786E560000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1611FF70000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 27C0F350000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1B279570000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1E70A460000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22D13110000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22C8C580000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2825F1D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 20BAEC90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1C782530000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\spoolsv.exe base: A60000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 24066EB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 181CEDB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2A142790000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 195B6F30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1428DCA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973730000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1DBFA540000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D76CCC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1A239D90000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 17CFA390000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 23FB7270000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1DF53B50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 164E88A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 25177B50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28D5D340000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\sihost.exe base: 24EB5E10000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 20859990000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1F153C20000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 1D241D40000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 16FADAD0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ctfmon.exe base: 20E03070000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 15204DB0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\explorer.exe base: 1200000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 175C5280000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 22EF1B30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 261DE4D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 22E74520000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\smartscreen.exe base: 226D8930000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 13E5E930000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 27234C50000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 28543540000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\audiodg.exe base: 2B684340000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F8362A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\conhost.exe base: 20E3F2F0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 238A0910000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1E3DC7B0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\svchost.exe base: 2B9EDBC0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\dllhost.exe base: 1EFFF1A0000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2490F910000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 2961B670000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Memory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 2961BA20000 protect: page execute and read and write | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\winlogon.exe EIP: 5895273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\lsass.exe EIP: ADFC273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: DD59273C | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 589B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AE89273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DE1A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: CBB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: E107273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 8C1D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 97FD273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: C:\Windows\System32\svchost.exe EIP: 652E273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A27A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 87DA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FB3C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 567273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C1F3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: E3BC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 3895273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6E56273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1FF7273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F35273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7957273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A46273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1311273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8C58273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5F1D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5D9C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AEC9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DC1B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8253273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A6273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 66EB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FD9A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: CEDB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4279273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: B6F3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8DCA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7373273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FA54273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 6CCC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 39D9273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FA39273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: B727273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 53B5273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: E88A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 77B5273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5D34273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: B5E1273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5999273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 53C2273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 41D4273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: ADAD273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 307273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4DB273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 120273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: C528273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 76AA273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F1B3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F34F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DE4D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 7452273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A9D0273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: AF8C273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: D893273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5E93273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4412273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 97E3273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DC87273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 698D273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 34C5273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 4354273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 8434273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 5892273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 362A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 3F2F273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: A091273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: DC7B273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: EDBC273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: FF1A273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: F91273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1B67273C | |
Source: C:\Windows\System32\dialer.exe | Thread created: unknown EIP: 1BA2273C | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E858950000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DD590000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160CB80000 value starts with: 4D5A | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E8589B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140AE890000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DE1A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160CBB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257E1070000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 254A27A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A205670000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26238950000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2786E560000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1611FF70000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27C0F350000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B279570000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E70A460000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22D13110000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C8C580000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20BAEC90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C782530000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: A60000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24066EB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 181CEDB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A142790000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195B6F30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DCA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973730000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DBFA540000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A239D90000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17CFA390000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23FB7270000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DF53B50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 164E88A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25177B50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28D5D340000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 24EB5E10000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20859990000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F153C20000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D241D40000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 16FADAD0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 20E03070000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15204DB0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 1200000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 175C5280000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22EF1B30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 261DE4D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74520000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 226D8930000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 13E5E930000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27234C50000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28543540000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\audiodg.exe base: 2B684340000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F8362A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 20E3F2F0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 238A0910000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1E3DC7B0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2B9EDBC0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 1EFFF1A0000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2490F910000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2961B670000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2961BA20000 value starts with: 4D5A | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E858950000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DD590000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160CB80000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DD00000 | Jump to behavior |
Source: C:\Windows\System32\lsass.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2490F800000 | Jump to behavior |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\winlogon.exe base: 1E8589B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\lsass.exe base: 140AE890000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195DE1A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dwm.exe base: 1160CBB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 257E1070000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 254A27A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A205670000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 26238950000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2786E560000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1611FF70000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27C0F350000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1B279570000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1E70A460000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22D13110000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22C8C580000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20BAEC90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1C782530000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\spoolsv.exe base: A60000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 24066EB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 181CEDB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2A142790000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 195B6F30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1428DCA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973730000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DBFA540000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1A239D90000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 17CFA390000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 23FB7270000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1DF53B50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 164E88A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 25177B50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28D5D340000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\sihost.exe base: 24EB5E10000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 20859990000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1F153C20000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 1D241D40000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 16FADAD0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ctfmon.exe base: 20E03070000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 15204DB0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\explorer.exe base: 1200000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 175C5280000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 22EF1B30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 261DE4D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74520000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\smartscreen.exe base: 226D8930000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 13E5E930000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 27234C50000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 28543540000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\audiodg.exe base: 2B684340000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F8362A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\conhost.exe base: 20E3F2F0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 238A0910000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1E3DC7B0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\svchost.exe base: 2B9EDBC0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\dllhost.exe base: 1EFFF1A0000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2490F910000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2961B670000 | |
Source: C:\Windows\System32\dialer.exe | Memory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2961BA20000 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation | |