Source: rundll32.exe, 00000006.00000002.2277487443.000002359C399000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2277302967.000002501BD77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/088a8c70-dba9-4e0a-9bf3-879e0aef6a77.crl0 |
Source: rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2295176726.0000025022ACA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702 |
Source: rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702%3 |
Source: rundll32.exe, 00000007.00000002.2295176726.0000025022ACA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702( |
Source: rundll32.exe, 00000007.00000003.1899345625.0000025022B07000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/2007024 |
Source: rundll32.exe, 00000006.00000002.2296471862.00000235A317B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/2007025 |
Source: rundll32.exe, 00000007.00000003.1899345625.0000025022B07000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702P |
Source: rundll32.exe, 00000006.00000002.2277487443.000002359C399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702ty |
Source: rundll32.exe, 00000007.00000003.1902121125.0000025022B33000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1899345625.0000025022B07000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512 |
Source: rundll32.exe, 00000007.00000002.2295176726.0000025022B09000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512%0 |
Source: rundll32.exe, 00000006.00000002.2277487443.000002359C399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512E |
Source: rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512ifest |
Source: rundll32.exe, 00000006.00000002.2304381812.00000235A357F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2277487443.000002359C399000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1902556440.0000025022A96000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1899345625.0000025022A77000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2290886534.0000025020730000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2308103522.00000250230FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: rundll32.exe, 00000007.00000002.2295176726.00000250229A5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA |
Source: rundll32.exe, 00000007.00000003.1902556440.0000025022A96000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1899345625.0000025022A77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdW |
Source: rundll32.exe, 00000007.00000003.1902556440.0000025022A96000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1899345625.0000025022A77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdX |
Source: rundll32.exe, 00000006.00000002.2277487443.000002359C464000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1902121125.0000025022B1F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1899345625.0000025022B07000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2295176726.0000025022ACA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy |
Source: rundll32.exe, 00000006.00000002.2277487443.000002359C464000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policygT |
Source: rundll32.exe, 00000007.00000003.1899345625.00000250229F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1904440404.0000025022A1A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policyx |
Source: rundll32.exe, 00000007.00000003.1899345625.00000250229F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1904440404.0000025022A1A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: rundll32.exe, 00000007.00000002.2295176726.0000025022ACA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/ |
Source: rundll32.exe, 00000006.00000002.2277487443.000002359C464000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trustGU |
Source: rundll32.exe, 00000006.00000002.2277487443.000002359C399000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2295176726.0000025022B09000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
Source: rundll32.exe, 00000007.00000003.1899345625.0000025022B07000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy61a |
Source: rundll32.exe, 00000007.00000002.2295176726.0000025022B09000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy80w |
Source: rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicynp: |
Source: rundll32.exe, 00000007.00000003.1899345625.0000025022B07000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicyt |
Source: rundll32.exe, 00000007.00000003.1899345625.0000025022B43000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: rundll32.exe, 00000007.00000002.2295176726.00000250229CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/3ws |
Source: rundll32.exe, 00000007.00000002.2295176726.00000250229CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/B |
Source: rundll32.exe, 00000006.00000003.1943852891.00000235A3533000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1939761812.00000235A352B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/c |
Source: rundll32.exe, 00000007.00000003.1899345625.0000025022B43000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/ |
Source: rundll32.exe, 00000007.00000002.2277302967.000002501BD77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/Z |
Source: rundll32.exe, 00000006.00000003.1943852891.00000235A3533000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1939761812.00000235A352B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/h |
Source: rundll32.exe, 00000006.00000003.1943852891.00000235A3533000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1939761812.00000235A352B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1936194539.00000235A34FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/u |
Source: rundll32.exe, 00000007.00000003.1899345625.0000025022B43000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/wskL |
Source: unknown | Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\stk.dll" | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\stk.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\stk.dll,Init | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\stk.dll",#1 | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\rundll32.exe c:\windows\system32\rundll32.exe "C:\Users\user\AppData\Local\Temp\PTOAuthEx.dll",Init hmc,6138 | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\rundll32.exe c:\windows\system32\rundll32.exe "C:\Users\user\AppData\Local\Temp\PTOAuthEx.dll",Init hmc,7295 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe c:\windows\system32\rundll32.exe "C:\Users\user\AppData\Local\Temp\PTOAuthEx.dll",Init hmc,5329 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\stk.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\stk.dll,Init | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe c:\windows\system32\rundll32.exe "C:\Users\user\AppData\Local\Temp\PTOAuthEx.dll",Init hmc,5329 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\stk.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\rundll32.exe c:\windows\system32\rundll32.exe "C:\Users\user\AppData\Local\Temp\PTOAuthEx.dll",Init hmc,6138 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\rundll32.exe c:\windows\system32\rundll32.exe "C:\Users\user\AppData\Local\Temp\PTOAuthEx.dll",Init hmc,7295 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: rundll32.exe, 00000007.00000002.2277302967.000002501BD77000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWP |
Source: rundll32.exe, 00000007.00000002.2308103522.00000250230FE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: NXTVMWare |
Source: rundll32.exe, 00000006.00000002.2296471862.00000235A317B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2006592710.00000235A36BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2296471862.00000235A315F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2295176726.0000025022B09000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: rundll32.exe, 00000007.00000002.2303997272.0000025022FC0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWf |
Source: C:\Windows\System32\loaddll64.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtSetInformationThread: Direct from: 0x7FFFEEFB2772 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Direct from: 0x7FFFEEC3FD03 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtSetInformationThread: Direct from: 0x7FFFEEEAD53C | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Direct from: 0x7FFFEEC383AF | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Direct from: 0x7FFFEEEAE9D9 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Direct from: 0x7FFFEEC0A963 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Direct from: 0x7FFFEEBFC9D3 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtClose: Indirect: 0x7FFFEEFD0755 | |
Source: C:\Windows\System32\loaddll64.exe | NtSetInformationProcess: Direct from: 0x7FFFEEFAE013 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtQueryInformationProcess: Direct from: 0x7FFFEEFB30A6 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtQueryInformationProcess: Direct from: 0x7FFFEEFB4626 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Direct from: 0x7FFFEEC484C9 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtQueryInformationProcess: Direct from: 0x7FFFEEFA9310 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Direct from: 0x7FFFEEBF9167 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ProgramData\Microsoft\User Account Pictures\user.png VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ProgramData\Microsoft\User Account Pictures\user.png VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ProgramData\Microsoft\User Account Pictures\user.png VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ProgramData\Microsoft\User Account Pictures\user.png VolumeInformation | Jump to behavior |