Source: C:\Program Files (x86)\Internet Explorer\RCXB6AF.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files\Windows Defender\RCXA207.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\ProgramData\Microsoft\MapData\RCXB47C.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files\Windows Multimedia Platform\RCXAA37.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Microsoft Office\RuntimeBroker.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Java\jre-1.8\RCXA65D.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\ProgramData\Microsoft\MapData\SystemSettings.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files\Microsoft\OneDrive\RCXC626.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Microsoft Office\RCXB219.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Internet Explorer\services.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files\Uninstall Information\RCXB8D3.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files (x86)\WindowsPowerShell\RCX9FD4.tmp | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: C:\Program Files\Uninstall Information\wininit.exe | Avira: detection malicious, Label: HEUR/AGEN.1323984 |
Source: 00000014.00000002.1780644862.0000000012B81000.00000004.00000800.00020000.00000000.sdmp | Malware Configuration Extractor: DCRat {"SCRT": "{\"3\":\"-\",\"x\":\"`\",\"B\":\".\",\"L\":\",\",\"6\":\"$\",\"n\":\"*\",\"9\":\"%\",\"M\":\"~\",\"o\":\"&\",\"I\":\";\",\"y\":\"^\",\"Z\":\"_\",\"g\":\")\",\"A\":\"#\",\"C\":\" \",\"X\":\"(\",\"i\":\"!\",\"H\":\"|\",\"0\":\"@\",\"m\":\"<\",\"J\":\">\"}", "PCRT": "{\"F\":\".\",\"J\":\"|\",\"o\":\"%\",\"C\":\"@\",\"1\":\"`\",\"U\":\"$\",\"l\":\"!\",\"3\":\"<\",\"a\":\"-\",\"V\":\",\",\"m\":\"~\",\"e\":\"*\",\"Y\":\"#\",\"S\":\">\",\"d\":\";\",\"0\":\")\",\"k\":\"^\",\"Q\":\" \",\"E\":\"(\",\"Z\":\"&\",\"W\":\"_\"}", "TAG": "", "MUTEX": "DCR_MUTEX-jEyOhPUj2jRHWsBrfp7T", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false} |
Source: C:\Program Files (x86)\Internet Explorer\services.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files (x86)\Internet Explorer\services.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files (x86)\Microsoft Office\RuntimeBroker.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files (x86)\Microsoft Office\RuntimeBroker.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files\Microsoft\OneDrive\IfYiMMRuvSUMKHkp.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files\Microsoft\OneDrive\IfYiMMRuvSUMKHkp.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files\Uninstall Information\wininit.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files\Uninstall Information\wininit.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files\Windows Multimedia Platform\IfYiMMRuvSUMKHkp.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files\Windows Multimedia Platform\IfYiMMRuvSUMKHkp.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\ProgramData\Microsoft\MapData\SystemSettings.exe | ReversingLabs: Detection: 84% |
Source: C:\ProgramData\Microsoft\MapData\SystemSettings.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | ReversingLabs: Detection: 84% |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Virustotal: Detection: 67% | Perma Link |
Source: C:\Program Files (x86)\Internet Explorer\RCXB6AF.tmp | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Joe Sandbox ML: detected |
Source: C:\Program Files\Windows Defender\RCXA207.tmp | Joe Sandbox ML: detected |
Source: C:\ProgramData\Microsoft\MapData\RCXB47C.tmp | Joe Sandbox ML: detected |
Source: C:\Program Files\Windows Multimedia Platform\RCXAA37.tmp | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Microsoft Office\RuntimeBroker.exe | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Java\jre-1.8\RCXA65D.tmp | Joe Sandbox ML: detected |
Source: C:\ProgramData\Microsoft\MapData\SystemSettings.exe | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Joe Sandbox ML: detected |
Source: C:\Program Files\Microsoft\OneDrive\RCXC626.tmp | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Microsoft Office\RCXB219.tmp | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Internet Explorer\services.exe | Joe Sandbox ML: detected |
Source: C:\Program Files\Uninstall Information\RCXB8D3.tmp | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe | Joe Sandbox ML: detected |
Source: C:\Program Files (x86)\WindowsPowerShell\RCX9FD4.tmp | Joe Sandbox ML: detected |
Source: C:\Program Files\Uninstall Information\wininit.exe | Joe Sandbox ML: detected |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Windows Defender\047efad0ccc033 | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Windows Multimedia Platform\IfYiMMRuvSUMKHkp.exe | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Windows Multimedia Platform\047efad0ccc033 | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Uninstall Information\wininit.exe | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Uninstall Information\56085415360792 | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Microsoft\OneDrive\IfYiMMRuvSUMKHkp.exe | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Microsoft\OneDrive\047efad0ccc033 | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Windows Defender\RCXA207.tmp | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Windows Multimedia Platform\RCXAA37.tmp | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Uninstall Information\RCXB8D3.tmp | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Directory created: C:\Program Files\Microsoft\OneDrive\RCXC626.tmp | Jump to behavior |
Source: hDKY4f6gEA.exe, 00000000.00000002.1923149196.0000000003180000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameDisableUAC.dclib4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2001593529.000000001BC90000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameFileSearcher.dclib4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2003824745.000000001C626000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameczHEjglJqNje4j.exeD vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2003824745.000000001C626000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFileName vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2001695665.000000001BCC0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenamePerformanceCounter.dclib4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.1931637010.00000000032B1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2001830299.000000001BCF0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename( vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2001620032.000000001BCA0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename( vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000000.1646003846.0000000000F92000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameczHEjglJqNje4j.exeD vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.1917323582.0000000003160000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameBuildInstallationTweaksPlugin.dll\ vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.1931637010.00000000039F5000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.1931637010.00000000039F5000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.1931637010.00000000039F5000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename8Em.exeD vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2004146373.000000001C6C7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameczHEjglJqNje4j.exeD vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.1907175697.0000000003150000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename( vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2003030686.000000001C310000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameUSBSpread.dll4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2001662201.000000001BCB0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMessageOnStart.dclib4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2001735131.000000001BCD0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2003068454.000000001C320000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameUserPingCounter.dclib4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2002384341.000000001C160000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilename05JTO83N2fiTkzY7mAmsYr6I.exeD vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2002384341.000000001C160000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameKpWuOxD.exeD vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2002384341.000000001C160000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameUzTvyhlVVu40TT576Y.exeD vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2003217197.000000001C530000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename( vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.2001776395.000000001BCE0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe, 00000000.00000002.1920485409.0000000003170000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameCrashLogger.dclib4 vs hDKY4f6gEA.exe |
Source: hDKY4f6gEA.exe | Binary or memory string: OriginalFilenameczHEjglJqNje4j.exeD vs hDKY4f6gEA.exe |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create |
Source: unknown | Process created: C:\Users\user\Desktop\hDKY4f6gEA.exe "C:\Users\user\Desktop\hDKY4f6gEA.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe "C:\Program Files (x86)\windowspowershell\dllhost.exe" | |
Source: unknown | Process created: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe "C:\Program Files (x86)\windowspowershell\dllhost.exe" | |
Source: unknown | Process created: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe "C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe" | |
Source: unknown | Process created: C:\Recovery\IfYiMMRuvSUMKHkp.exe C:\Recovery\IfYiMMRuvSUMKHkp.exe | |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: twext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: cscui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: workfoldersshell.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: starttiledata.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: usermgrcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: usermgrproxy.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: acppage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: aepic.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hDKY4f6gEA.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Program Files (x86)\WindowsPowerShell\dllhost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Recovery\IfYiMMRuvSUMKHkp.exe | Section loaded: sspicli.dll | Jump to behavior |