Click to jump to signature section
Source: windowsaudioservice.exe, 00000005.00000003.3325195819.0000000002390000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: stratum+tcp:// |
Source: windowsaudioservice.exe, 00000005.00000003.3325195819.0000000002390000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: cryptonight/0 |
Source: windowsaudioservice.exe, 00000005.00000003.3325195819.0000000002390000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: stratum+tcp:// |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6D2570 NetUserEnum,NetApiBufferFree,NetUserGetInfo,IsValidSid,GetLengthSid,CopySid,NetUserGetLocalGroups,NetApiBufferFree,NetApiBufferFree,NetApiBufferFree,LsaEnumerateLogonSessions,LsaFreeReturnBuffer,LsaGetLogonSessionData,LsaFreeReturnBuffer,LsaFreeReturnBuffer,NetApiBufferFree, | 7_2_00007FF7AF6D2570 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 1111 |
Source: unknown | Network traffic detected: HTTP traffic on port 1111 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 1111 |
Source: unknown | Network traffic detected: HTTP traffic on port 1111 -> 49722 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 1111 |
Source: unknown | Network traffic detected: HTTP traffic on port 1111 -> 49723 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.86.76.134 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3189720333.000003647E130000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3197053450.000003647E130000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3210565344.000003647E130000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3186135211.000003647E130000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://172.86.76.134:1111/audiodevice |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3313848485.00000364802F0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802EF000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333122127.00000364802E0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333215380.0000036484212000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802D0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3308693534.00000364841FF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: windowsaudioservice.exe, 00000005.00000002.3377767585.0000000000517000.00000004.00000020.00020000.00000000.sdmp, windowsaudioservice.exe, 00000005.00000002.3377767585.000000000043C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/origin_ca.crl |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3343760698.000003648438C000.00000004.00001000.00020000.00000000.sdmp, windowsaudioservice.exe, 00000005.00000002.3377767585.00000000004CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/origin_ca.crl0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3343760698.00000364843D6000.00000004.00001000.00020000.00000000.sdmp, windowsaudioservice.exe, 00000005.00000002.3377767585.0000000000517000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/origin_ca.crlS |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3343760698.00000364843D6000.00000004.00001000.00020000.00000000.sdmp, windowsaudioservice.exe, 00000005.00000002.3377767585.0000000000517000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.cloudflare.com/origin_ca.crlxF |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3231341880.000003647E240000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3229268657.000003647E1F2000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3231341880.000003647E240000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3231341880.000003647E240000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3231341880.000003647E240000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3313848485.00000364802F0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802EF000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333122127.00000364802E0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333215380.0000036484212000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802D0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3308693534.00000364841FF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3308693534.0000036484160000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/DigiCertGlobalRootG2.crl2 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3313848485.00000364802F0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802EF000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333122127.00000364802E0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333215380.0000036484212000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802D0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3308693534.00000364841FF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3343760698.00000364842FB000.00000004.00001000.00020000.00000000.sdmp, windowsaudioservice.exe, 00000005.00000002.3377767585.000000000043C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.cloudflare.com/origin_ca |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3343760698.00000364843D6000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3343760698.000003648438C000.00000004.00001000.00020000.00000000.sdmp, windowsaudioservice.exe, 00000005.00000002.3377767585.0000000000517000.00000004.00000020.00020000.00000000.sdmp, windowsaudioservice.exe, 00000005.00000002.3377767585.00000000004CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.cloudflare.com/origin_ca0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3313848485.00000364802F0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802EF000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333122127.00000364802E0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3333215380.0000036484212000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802D0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3308693534.00000364841FF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3308693534.0000036484160000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com1.3.6.1.5.5.7.48.2http://cacerts.digicert.com/DigiCertGlobalRootG2.crt |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3333122127.00000364802E0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313061932.00000364802D0000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3308693534.00000364841F5000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: svhost.exe.0.dr | String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3310916310.00000364843C4000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3335035446.000003648441F000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3335052114.00000364823CC000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3339978275.000003647E3FF000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://wns.windows.com/e |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6D1090 NtQuerySystemInformation, | 7_2_00007FF7AF6D1090 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF69CF60 NtCreateFile,RtlNtStatusToDosError,CreateIoCompletionPort,SetFileCompletionNotificationModes,GetLastError,GetLastError,CloseHandle, | 7_2_00007FF7AF69CF60 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF69CD60 NtCancelIoFileEx,RtlNtStatusToDosError, | 7_2_00007FF7AF69CD60 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6D3A60 NtQuerySystemInformation, | 7_2_00007FF7AF6D3A60 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF698930 NtCancelIoFileEx,RtlNtStatusToDosError, | 7_2_00007FF7AF698930 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6C7850 NtQuerySystemInformation,NtQuerySystemInformation, | 7_2_00007FF7AF6C7850 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6FA720 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,SleepConditionVariableSRW, | 7_2_00007FF7AF6FA720 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6CD6D0 NtQuerySystemInformation,NtQuerySystemInformation, | 7_2_00007FF7AF6CD6D0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6F9210 CloseHandle,NtCreateFile,RtlNtStatusToDosError, | 7_2_00007FF7AF6F9210 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF573080 | 7_2_00007FF7AF573080 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5C7060 | 7_2_00007FF7AF5C7060 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5C6070 | 7_2_00007FF7AF5C6070 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF56B100 | 7_2_00007FF7AF56B100 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF613F30 | 7_2_00007FF7AF613F30 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6E7010 | 7_2_00007FF7AF6E7010 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6BCFF0 | 7_2_00007FF7AF6BCFF0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF690FB0 | 7_2_00007FF7AF690FB0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF70DF00 | 7_2_00007FF7AF70DF00 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF68FE10 | 7_2_00007FF7AF68FE10 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5C5E10 | 7_2_00007FF7AF5C5E10 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF633DC0 | 7_2_00007FF7AF633DC0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF719CA0 | 7_2_00007FF7AF719CA0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF730B90 | 7_2_00007FF7AF730B90 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF666A30 | 7_2_00007FF7AF666A30 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF7139E0 | 7_2_00007FF7AF7139E0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6BF9B0 | 7_2_00007FF7AF6BF9B0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF7188B0 | 7_2_00007FF7AF7188B0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5767D0 | 7_2_00007FF7AF5767D0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6137A0 | 7_2_00007FF7AF6137A0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF73A710 | 7_2_00007FF7AF73A710 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5C6700 | 7_2_00007FF7AF5C6700 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5B66C0 | 7_2_00007FF7AF5B66C0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6D2570 | 7_2_00007FF7AF6D2570 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF713600 | 7_2_00007FF7AF713600 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6DF5B0 | 7_2_00007FF7AF6DF5B0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF67A5A0 | 7_2_00007FF7AF67A5A0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5B0420 | 7_2_00007FF7AF5B0420 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF71B500 | 7_2_00007FF7AF71B500 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6C8420 | 7_2_00007FF7AF6C8420 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF733430 | 7_2_00007FF7AF733430 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF737470 | 7_2_00007FF7AF737470 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF7143B0 | 7_2_00007FF7AF7143B0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6C6400 | 7_2_00007FF7AF6C6400 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF731330 | 7_2_00007FF7AF731330 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6BF3B0 | 7_2_00007FF7AF6BF3B0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF6C82C0 | 7_2_00007FF7AF6C82C0 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF734130 | 7_2_00007FF7AF734130 |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Code function: 7_2_00007FF7AF5C61F0 | 7_2_00007FF7AF5C61F0 |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3310916310.00000364843C4000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameEXPLORER.EXE.MUIj% vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3231341880.000003647E240000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameWinRing0.sys2 vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3335052114.000003648236A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameApplicationFrameHost.exej% vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3335035446.000003648441F000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameEXPLORER.EXE.MUIj% vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3229268657.000003647E1F2000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameWinRing0.sys2 vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3339978275.000003647E3FF000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameEXPLORER.EXE.MUIj% vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3263574116.000003647C660000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamesvchost.exeD vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe, 00000000.00000000.2123706061.00007FF6A76F3000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamesvchost.exeD vs 4LX9x1PMAW.exe |
Source: 4LX9x1PMAW.exe | Binary or memory string: OriginalFilenamesvchost.exeD vs 4LX9x1PMAW.exe |
Source: unknown | Process created: C:\Users\user\Desktop\4LX9x1PMAW.exe "C:\Users\user\Desktop\4LX9x1PMAW.exe" | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager | |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Process created: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe "C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe" | |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Users\user\AppData\Local\Windows\svhost.exe "C:\Users\user\AppData\Local\Windows\svhost.exe" | |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Process created: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe "C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: perfos.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: licensemanagersvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: licensemanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: clipc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: opencl.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Windows\svhost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: 4LX9x1PMAW.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: 4LX9x1PMAW.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: 4LX9x1PMAW.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: 4LX9x1PMAW.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: 4LX9x1PMAW.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: 4LX9x1PMAW.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: 4LX9x1PMAW.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: 4LX9x1PMAW.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: 4LX9x1PMAW.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: 4LX9x1PMAW.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: 4LX9x1PMAW.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: 4LX9x1PMAW.exe | Static PE information: section name: _RDATA |
Source: svhost.exe.0.dr | Static PE information: section name: _RDATA |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: .themida |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: .boot |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014C552 push ecx; retf | 5_2_0014C559 |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014E41C pushad ; retf | 5_2_0014E41D |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014CC5A pushad ; iretd | 5_2_0014CCB9 |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014CEDA pushad ; iretd | 5_2_0014CEE1 |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014E204 pushad ; retf | 5_2_0014E205 |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014CA82 push ecx; retf | 5_2_0014CAA9 |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014CDF2 pushad ; iretd | 5_2_0014CE29 |
Source: C:\Users\user\AppData\Local\Windows\windowsaudioservice.exe | Code function: 5_2_0014CE2A pushad ; iretd | 5_2_0014CED9 |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: entropy: 7.839104982881267 |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: entropy: 7.8717398799845935 |
Source: windowsaudioservice.exe.0.dr | Static PE information: section name: entropy: 7.770884661840453 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 1111 |
Source: unknown | Network traffic detected: HTTP traffic on port 1111 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 1111 |
Source: unknown | Network traffic detected: HTTP traffic on port 1111 -> 49722 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 1111 |
Source: unknown | Network traffic detected: HTTP traffic on port 1111 -> 49723 |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | WMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\4LX9x1PMAW.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3310916310.00000364842FB000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3304216830.00000364821CB000.00000004.00001000.00020000.00000000.sdmp, 4LX9x1PMAW.exe, 00000000.00000003.3313077548.000003647E2EB000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Hyper-V bwygjysogxfytqn Bus |
Source: 4LX9x1PMAW.exe, 00000000.00000003.3291826667.000001DDB1038000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Si |