Source: | Binary string: wininet.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dhcpcsvc.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wkernel32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: winnsi.pdbT8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: msvcrt.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: iertutil.pdbX8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: winhttp.pdbj8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb"8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wrpcrt4.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: wrpcrt4.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: ws2_32.pdb68 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb:8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: shcore.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: winnsi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: wmswsock.pdbl8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: fltLib.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: advapi32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: shell32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dhcpcsvc6.pdbR8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: msvcp_win.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: dnsapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wwin32u.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: winhttp.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: OnDemandConnRouteHelper.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: comdlg32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: ws2_32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32full.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: sechost.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: nsi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb<8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: powrprof.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dhcpcsvc.pdbN8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdbp8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wmswsock.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: iertutil.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: cryptbase.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: comctl32v582.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: Windows.Storage.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wuser32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: rasadhlp.pdb(8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dnsapi.pdbf8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: rasadhlp.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: cryptbase.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wimm32.pdb~8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: WerFault.exe, 0000002F.00000003.452879282.0000000005121000.00000004.00000001.sdmp | String found in binary or memory: http://crl.microsoft |
Source: wa71myDkbQ.exe, 00000000.00000002.352158045.00000000028A1000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/abuse |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/br |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/de |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/dk |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/docs/api |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/es |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/faq |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/feedback |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/fi |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/fr |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/in |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/jp |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/kr |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/login |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/no |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/pl |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/register |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/ru |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/se |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/terms |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://anonfiles.com/us |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://cdn-101.anonfiles.com/P1hemdxeu9/4573c555-1623353401/cmd.exe |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js |
Source: QshTYpu5dWRfMPie.exe.13.dr | String found in binary or memory: https://oss.maxcdn.com/respond/1.4.2/respond.min.js |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_003639A2 | 0_2_003639A2 |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C122C0 | 0_2_00C122C0 |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C13320 | 0_2_00C13320 |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C122FA | 0_2_00C122FA |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C122B0 | 0_2_00C122B0 |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C13648 | 0_2_00C13648 |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C12A33 | 0_2_00C12A33 |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C133C1 | 0_2_00C133C1 |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Code function: 0_2_00C12B22 | 0_2_00C12B22 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040E018 | 13_2_0040E018 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040A0DA | 13_2_0040A0DA |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040E882 | 13_2_0040E882 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0041B1D2 | 13_2_0041B1D2 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_00412AB0 | 13_2_00412AB0 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040E44D | 13_2_0040E44D |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040DC00 | 13_2_0040DC00 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0041CDD9 | 13_2_0041CDD9 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040D704 | 13_2_0040D704 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040BF30 | 13_2_0040BF30 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_00424FD0 | 13_2_00424FD0 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_005339A2 | 13_2_005339A2 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E899C5 | 14_2_00E899C5 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E89CBF | 14_2_00E89CBF |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E8301E | 14_2_00E8301E |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E9F289 | 14_2_00E9F289 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E85BB1 | 14_2_00E85BB1 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E9FB09 | 14_2_00E9FB09 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E8A582 | 14_2_00E8A582 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E9C611 | 14_2_00E9C611 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E84F57 | 14_2_00E84F57 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B4301E | 25_2_00B4301E |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B499C5 | 25_2_00B499C5 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B5F289 | 25_2_00B5F289 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B45BB1 | 25_2_00B45BB1 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B5FB09 | 25_2_00B5FB09 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B49CBF | 25_2_00B49CBF |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B4A582 | 25_2_00B4A582 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B5C611 | 25_2_00B5C611 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B44F57 | 25_2_00B44F57 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B4301E | 33_2_00B4301E |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B499C5 | 33_2_00B499C5 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B5F289 | 33_2_00B5F289 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B45BB1 | 33_2_00B45BB1 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B5FB09 | 33_2_00B5FB09 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B4E36D | 33_2_00B4E36D |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B49CBF | 33_2_00B49CBF |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B4A582 | 33_2_00B4A582 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B5C611 | 33_2_00B5C611 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B44F57 | 33_2_00B44F57 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B4301E | 36_2_00B4301E |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B499C5 | 36_2_00B499C5 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B5F289 | 36_2_00B5F289 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B45BB1 | 36_2_00B45BB1 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B5FB09 | 36_2_00B5FB09 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B49CBF | 36_2_00B49CBF |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B4A582 | 36_2_00B4A582 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B5C611 | 36_2_00B5C611 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B44F57 | 36_2_00B44F57 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: String function: 00E8B680 appears 45 times | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: String function: 00B64BBE appears 48 times | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: String function: 00B5536B appears 72 times | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: String function: 00B4B680 appears 135 times | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: String function: 00B5D965 appears 51 times | |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: String function: 0040B210 appears 49 times | |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: String function: 00424FAC appears 81 times | |
Source: wa71myDkbQ.exe | Binary or memory string: OriginalFilename vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 00000000.00000002.366956155.0000000005190000.00000002.00000001.sdmp | Binary or memory string: System.OriginalFileName vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 00000000.00000002.367136382.0000000005290000.00000002.00000001.sdmp | Binary or memory string: originalfilename vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 00000000.00000002.367136382.0000000005290000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamepropsys.dll.mui@ vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 00000000.00000002.351844375.0000000002820000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameClassLibrary1.dll: vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 00000000.00000002.366748361.0000000004CE0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamemscorrc.dllT vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 00000000.00000000.229347610.0000000000332000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameConsoleApp4.exej% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 00000000.00000002.364508363.00000000039B2000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameKxbxzugtinf.dll" vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe | Binary or memory string: OriginalFilename vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000000.349976379.0000000000502000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameClassLibrary1.dll: vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000000.349976379.0000000000502000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameConsoleApp4.exej% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.368025848.0000000003C40000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameuser32j% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.368234681.0000000003DF0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.367101702.0000000002FA0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamemswsock.dll.muij% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.367126578.00000000030F0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.367693634.0000000003990000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameSHELL32.DLL.MUIj% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.367246347.00000000034B0000.00000002.00000001.sdmp | Binary or memory string: System.OriginalFileName vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.367467715.00000000035B0000.00000002.00000001.sdmp | Binary or memory string: originalfilename vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.367467715.00000000035B0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamepropsys.dll.mui@ vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.368221957.0000000003DE0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameDUser.DLL.MUIj% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe, 0000000D.00000002.367553941.00000000038A0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe | Binary or memory string: OriginalFilenameClassLibrary1.dll: vs wa71myDkbQ.exe |
Source: wa71myDkbQ.exe | Binary or memory string: OriginalFilenameConsoleApp4.exej% vs wa71myDkbQ.exe |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5724:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4336:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5572:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4060:120:WilError_01 |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5044 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Mutant created: \Sessions\1\BaseNamedObjects\17134.1.x86fre.rs4_release.180410-1804_x86Maria.180502-1909 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5300:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1856:120:WilError_01 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | File read: C:\Windows\System32\drivers\etc\hosts | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | File read: C:\Windows\System32\drivers\etc\hosts | |
Source: C:\Windows\SysWOW64\WerFault.exe | File read: C:\Windows\System32\drivers\etc\hosts | |
Source: C:\Windows\SysWOW64\WerFault.exe | File read: C:\Windows\System32\drivers\etc\hosts | |
Source: unknown | Process created: C:\Users\user\Desktop\wa71myDkbQ.exe 'C:\Users\user\Desktop\wa71myDkbQ.exe' | |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process created: C:\Windows\SysWOW64\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Ovwofzapxgm.vbs' | |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process created: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | |
Source: C:\Windows\SysWOW64\wscript.exe | Process created: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe 'C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe' | |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c schtasks /create /tn {AELSS3UH-VR7V-NBSY-5O4X-Q8QSBKMTZAA2} /tr C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny '*S-1-1-0:(R,REA,RA,RD)' '*S-1-5-7:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'SYSTEM:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn {AELSS3UH-VR7V-NBSY-5O4X-Q8QSBKMTZAA2} /tr C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny '*S-1-1-0:(R,REA,RA,RD)' '*S-1-5-7:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Administrators:(R,REA,RA,RD)' | |
Source: unknown | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'SYSTEM:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Users:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Administrators:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'user:(R,REA,RA,RD)' | |
Source: unknown | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Users:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'user:(R,REA,RA,RD)' | |
Source: unknown | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe' | |
Source: unknown | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe' | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 928 | |
Source: unknown | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe' | |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process created: C:\Windows\SysWOW64\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Ovwofzapxgm.vbs' | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process created: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe | Process created: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe 'C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c schtasks /create /tn {AELSS3UH-VR7V-NBSY-5O4X-Q8QSBKMTZAA2} /tr C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny '*S-1-1-0:(R,REA,RA,RD)' '*S-1-5-7:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'SYSTEM:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Administrators:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Users:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'user:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn {AELSS3UH-VR7V-NBSY-5O4X-Q8QSBKMTZAA2} /tr C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny '*S-1-1-0:(R,REA,RA,RD)' '*S-1-5-7:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'SYSTEM:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Administrators:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Users:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'user:(R,REA,RA,RD)' | |
Source: | Binary string: wininet.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dhcpcsvc.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wkernel32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: winnsi.pdbT8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: msvcrt.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: iertutil.pdbX8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: winhttp.pdbj8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb"8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wrpcrt4.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: wrpcrt4.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: ws2_32.pdb68 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb:8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: shcore.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: winnsi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: wmswsock.pdbl8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: fltLib.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: advapi32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: shell32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dhcpcsvc6.pdbR8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: msvcp_win.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: dnsapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wwin32u.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: winhttp.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: OnDemandConnRouteHelper.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: comdlg32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: ws2_32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32full.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: sechost.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: nsi.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb<8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: powrprof.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dhcpcsvc.pdbN8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdbp8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wmswsock.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: iertutil.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: cryptbase.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: comctl32v582.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdb source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: Windows.Storage.pdb source: WerFault.exe, 0000002F.00000003.431937820.0000000005550000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wuser32.pdb source: WerFault.exe, 0000002F.00000003.431731451.0000000005451000.00000004.00000001.sdmp |
Source: | Binary string: rasadhlp.pdb(8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: dnsapi.pdbf8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: rasadhlp.pdb source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: | Binary string: cryptbase.pdbk source: WerFault.exe, 0000002F.00000003.431833581.0000000005551000.00000004.00000040.sdmp |
Source: | Binary string: wimm32.pdb~8 source: WerFault.exe, 0000002F.00000003.431854024.0000000005558000.00000004.00000040.sdmp |
Source: wa71myDkbQ.exe, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: wa71myDkbQ.exe.0.dr, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 0.2.wa71myDkbQ.exe.330000.0.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 0.0.wa71myDkbQ.exe.330000.0.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 13.2.wa71myDkbQ.exe.500000.1.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 13.0.wa71myDkbQ.exe.500000.9.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 13.0.wa71myDkbQ.exe.500000.12.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 13.0.wa71myDkbQ.exe.500000.0.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 13.0.wa71myDkbQ.exe.500000.3.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: 13.0.wa71myDkbQ.exe.500000.6.unpack, u0001/u0005.cs | .Net Code: \x01 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040B256 push ecx; ret | 13_2_0040B269 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0042B63D push esi; ret | 13_2_0042B646 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040AEBF push ecx; ret | 13_2_0040AED2 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_00424FAC push eax; ret | 13_2_00424FCA |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00EA4B2D push ecx; ret | 14_2_00EA4B40 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E8B6C6 push ecx; ret | 14_2_00E8B6D9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B64B2D push ecx; ret | 25_2_00B64B40 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B4B6C6 push ecx; ret | 25_2_00B4B6D9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B64B2D push ecx; ret | 33_2_00B64B40 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B4B6C6 push ecx; ret | 33_2_00B4B6D9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B64B2D push ecx; ret | 36_2_00B64B40 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B4B6C6 push ecx; ret | 36_2_00B4B6D9 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040A0DA GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 13_2_0040A0DA |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: wa71myDkbQ.exe, 0000000D.00000002.367553941.00000000038A0000.00000002.00000001.sdmp, WerFault.exe, 0000002F.00000002.456238833.00000000051C0000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: WerFault.exe, 0000002F.00000003.452903812.000000000517B000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW |
Source: wscript.exe, 0000000C.00000002.353332122.0000000003043000.00000004.00000020.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y' |
Source: wa71myDkbQ.exe, 0000000D.00000002.367553941.00000000038A0000.00000002.00000001.sdmp, WerFault.exe, 0000002F.00000002.456238833.00000000051C0000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: wa71myDkbQ.exe, 0000000D.00000002.367553941.00000000038A0000.00000002.00000001.sdmp, WerFault.exe, 0000002F.00000002.456238833.00000000051C0000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: wa71myDkbQ.exe, 0000000D.00000002.367553941.00000000038A0000.00000002.00000001.sdmp, WerFault.exe, 0000002F.00000002.456238833.00000000051C0000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Process queried: DebugPort | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Process queried: DebugPort | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Process queried: DebugPort | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Process queried: DebugPort | |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Process queried: DebugPort | |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_00415B9F mov eax, dword ptr fs:[00000030h] | 13_2_00415B9F |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E82390 mov eax, dword ptr fs:[00000030h] | 14_2_00E82390 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E99643 mov eax, dword ptr fs:[00000030h] | 14_2_00E99643 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E92E1C mov eax, dword ptr fs:[00000030h] | 14_2_00E92E1C |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B42390 mov eax, dword ptr fs:[00000030h] | 25_2_00B42390 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B52E1C mov eax, dword ptr fs:[00000030h] | 25_2_00B52E1C |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B59643 mov eax, dword ptr fs:[00000030h] | 25_2_00B59643 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B42390 mov eax, dword ptr fs:[00000030h] | 33_2_00B42390 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B52E1C mov eax, dword ptr fs:[00000030h] | 33_2_00B52E1C |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B59643 mov eax, dword ptr fs:[00000030h] | 33_2_00B59643 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B42390 mov eax, dword ptr fs:[00000030h] | 36_2_00B42390 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B52E1C mov eax, dword ptr fs:[00000030h] | 36_2_00B52E1C |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B59643 mov eax, dword ptr fs:[00000030h] | 36_2_00B59643 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040B16A SetUnhandledExceptionFilter, | 13_2_0040B16A |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040B01C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 13_2_0040B01C |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0040B571 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 13_2_0040B571 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: 13_2_0041353E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 13_2_0041353E |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E8B46C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 14_2_00E8B46C |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E8AE59 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 14_2_00E8AE59 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: 14_2_00E9273E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 14_2_00E9273E |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B4B46C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 25_2_00B4B46C |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B4AE59 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 25_2_00B4AE59 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 25_2_00B5273E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 25_2_00B5273E |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B4B46C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 33_2_00B4B46C |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B4AE59 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 33_2_00B4AE59 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 33_2_00B5273E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 33_2_00B5273E |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B4B46C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_00B4B46C |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B4AE59 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 36_2_00B4AE59 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: 36_2_00B5273E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 36_2_00B5273E |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 400000 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 401000 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 427000 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 438000 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 43A000 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 43B000 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 43C000 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Memory written: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe base: 60D008 | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process created: C:\Windows\SysWOW64\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Ovwofzapxgm.vbs' | Jump to behavior |
Source: C:\Users\user\Desktop\wa71myDkbQ.exe | Process created: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe | Process created: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe 'C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c schtasks /create /tn {AELSS3UH-VR7V-NBSY-5O4X-Q8QSBKMTZAA2} /tr C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny '*S-1-1-0:(R,REA,RA,RD)' '*S-1-5-7:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'SYSTEM:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Administrators:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Users:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'user:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Process created: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn {AELSS3UH-VR7V-NBSY-5O4X-Q8QSBKMTZAA2} /tr C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny '*S-1-1-0:(R,REA,RA,RD)' '*S-1-5-7:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'SYSTEM:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Administrators:(R,REA,RA,RD)' | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'Users:(R,REA,RA,RD)' | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\icacls.exe icacls 'C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}' /inheritance:e /deny 'user:(R,REA,RA,RD)' | |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 13_2_00421008 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: GetLocaleInfoW, | 13_2_0041A0B2 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: GetLocaleInfoW, | 13_2_00421258 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 13_2_00421381 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 13_2_00420C1D |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: GetLocaleInfoW, | 13_2_00421488 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 13_2_00421555 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: EnumSystemLocalesW, | 13_2_00419D0D |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: EnumSystemLocalesW, | 13_2_00420EE0 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: EnumSystemLocalesW, | 13_2_00420E95 |
Source: C:\Users\user\AppData\Local\Temp\wa71myDkbQ.exe | Code function: EnumSystemLocalesW, | 13_2_00420F7B |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: GetLocaleInfoW, | 14_2_00E9D1D6 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 14_2_00E9D2FE |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: GetLocaleInfoW, | 14_2_00E9DBF9 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 14_2_00E9CB6A |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 14_2_00E9D4D9 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: GetLocaleInfoW, | 14_2_00E9D406 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: EnumSystemLocalesW, | 14_2_00E9CEF6 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: EnumSystemLocalesW, | 14_2_00E9D6DD |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: EnumSystemLocalesW, | 14_2_00E9CE5B |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: EnumSystemLocalesW, | 14_2_00E9CE10 |
Source: C:\Users\user\AppData\Local\Temp\Izhwsiraoosvchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 14_2_00E9CF81 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 25_2_00B5D1D6 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 25_2_00B5D2FE |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 25_2_00B5DBF9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 25_2_00B5CB6A |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 25_2_00B5D4D9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 25_2_00B5D406 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 25_2_00B5CEF6 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 25_2_00B5D6DD |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 25_2_00B5CE10 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 25_2_00B5CE5B |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 25_2_00B5CF81 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 33_2_00B5D1D6 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 33_2_00B5D2FE |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 33_2_00B5DBF9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 33_2_00B5CB6A |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 33_2_00B5D4D9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 33_2_00B5D406 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 33_2_00B5CEF6 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 33_2_00B5D6DD |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 33_2_00B5CE10 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 33_2_00B5CE5B |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 33_2_00B5CF81 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 36_2_00B5D1D6 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 36_2_00B5D2FE |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 36_2_00B5DBF9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 36_2_00B5CB6A |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 36_2_00B5D4D9 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW, | 36_2_00B5D406 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 36_2_00B5CEF6 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 36_2_00B5D6DD |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 36_2_00B5CE10 |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: EnumSystemLocalesW, | 36_2_00B5CE5B |
Source: C:\ProgramData\{M055YUNB-FDR0-F9S1-IAP2-I6YVHFCKPVZM}\AIKY.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 36_2_00B5CF81 |