Source: Yara match | File source: fptlVDDPkS.dll, type: SAMPLE |
Source: Yara match | File source: 13.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.2839b600000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.1f642760000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.20918000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.1fb23c10000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.1caee260000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.2904bc50000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.23caa570000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.23bdebe0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 13.2.rundll32.exe.1d35a0b0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.19c54e40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.248ade40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.26cfa220000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.2bed4880000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.1913f180000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.1bc60be0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.12098000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.1dc50a90000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000004.00000002.1668412370.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.1666955684.0000020918002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3523087270.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1779910260.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1668395234.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1778990439.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1765732103.000002839B602000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1775787220.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1773163697.0000023BDEBE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1767938482.0000019C54E42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1775949797.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1769289446.000001FB23C12000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1774386818.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1769582440.000002904BC52000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1776417055.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1777637531.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1772006527.000001DC50A92000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1695695577.00000248ADE42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1727589413.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1771066252.000001D35A0B2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1776033093.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1769466887.000001CAEE262000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1771215742.0000026CFA222000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3521166027.000002BED4882000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1776484924.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1771163576.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1726303377.000001913F182000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1696549339.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1667472107.000001BC60BE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1776419485.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1769938139.000001F642762000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1766023435.0000012098002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1769892834.0000023CAA572000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1778180373.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 2008, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 1544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6460, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4888, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4916, type: MEMORYSTR |
Source: Yara match | File source: fptlVDDPkS.dll, type: SAMPLE |
Source: Yara match | File source: 13.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.2839b600000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.1f642760000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.20918000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.1fb23c10000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.1caee260000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.2904bc50000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.23caa570000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.23bdebe0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 13.2.rundll32.exe.1d35a0b0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.19c54e40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.248ade40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.26cfa220000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.2bed4880000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.1913f180000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.1bc60be0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.12098000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.1dc50a90000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000004.00000002.1668412370.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.1666955684.0000020918002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3523087270.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1779910260.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1668395234.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1778990439.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1765732103.000002839B602000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1775787220.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1773163697.0000023BDEBE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1767938482.0000019C54E42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1775949797.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1769289446.000001FB23C12000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1774386818.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1769582440.000002904BC52000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1776417055.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1777637531.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1772006527.000001DC50A92000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1695695577.00000248ADE42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1727589413.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1771066252.000001D35A0B2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1776033093.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1769466887.000001CAEE262000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1771215742.0000026CFA222000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3521166027.000002BED4882000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1776484924.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1771163576.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1726303377.000001913F182000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1696549339.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1667472107.000001BC60BE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1776419485.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1769938139.000001F642762000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1766023435.0000012098002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1769892834.0000023CAA572000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1778180373.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 2008, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 1544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6460, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4888, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4916, type: MEMORYSTR |
Source: unknown | Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\fptlVDDPkS.dll" | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fptlVDDPkS.dll,V_FixDoubleSlashes | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fptlVDDPkS.dll,V_FixSlashes | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fptlVDDPkS.dll,V_IsAbsolutePath | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_FixDoubleSlashes | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_FixSlashes | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_IsAbsolutePath | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_vsnwprintf | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_strncpy | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_strncat_length | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_strncat | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_snprintf | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_UTF8ToUTF16 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_UTF16ToUTF8 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_StripTrailingSlash | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_StripLastDir | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_RemoveDotSlashes | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fptlVDDPkS.dll,V_FixDoubleSlashes | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fptlVDDPkS.dll,V_FixSlashes | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fptlVDDPkS.dll,V_IsAbsolutePath | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_FixDoubleSlashes | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_FixSlashes | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_IsAbsolutePath | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_vsnwprintf | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_strncpy | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_strncat_length | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_strncat | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_snprintf | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_UTF8ToUTF16 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_UTF16ToUTF8 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_StripTrailingSlash | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_StripLastDir | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",V_RemoveDotSlashes | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fptlVDDPkS.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\Users\user\Desktop\fptlVDDPkS.dll VolumeInformation | |
Source: Yara match | File source: fptlVDDPkS.dll, type: SAMPLE |
Source: Yara match | File source: 13.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.2839b600000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.1f642760000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.20918000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.1fb23c10000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.1caee260000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.2904bc50000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.23caa570000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.23bdebe0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 13.2.rundll32.exe.1d35a0b0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.19c54e40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.248ade40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.26cfa220000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.2bed4880000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.1913f180000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.1bc60be0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.12098000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.1dc50a90000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000004.00000002.1668412370.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.1666955684.0000020918002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3523087270.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1779910260.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1668395234.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1778990439.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1765732103.000002839B602000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1775787220.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1773163697.0000023BDEBE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1767938482.0000019C54E42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1775949797.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1769289446.000001FB23C12000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1774386818.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1769582440.000002904BC52000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1776417055.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1777637531.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1772006527.000001DC50A92000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1695695577.00000248ADE42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1727589413.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1771066252.000001D35A0B2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1776033093.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1769466887.000001CAEE262000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1771215742.0000026CFA222000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3521166027.000002BED4882000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1776484924.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1771163576.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1726303377.000001913F182000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1696549339.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1667472107.000001BC60BE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1776419485.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1769938139.000001F642762000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1766023435.0000012098002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1769892834.0000023CAA572000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1778180373.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 2008, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 1544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6460, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4888, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4916, type: MEMORYSTR |
Source: Yara match | File source: fptlVDDPkS.dll, type: SAMPLE |
Source: Yara match | File source: 13.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.2839b600000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.1f642760000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.20918000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.1fb23c10000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.1caee260000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.2904bc50000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.23caa570000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.23bdebe0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 13.2.rundll32.exe.1d35a0b0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 4.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.rundll32.exe.19c54e40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.248ade40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.26cfa220000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.rundll32.exe.2bed4880000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 18.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.1913f180000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 9.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.1bc60be0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.12098000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 11.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 12.2.rundll32.exe.1dc50a90000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 10.2.rundll32.exe.7ffdfaf00000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000004.00000002.1668412370.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.1666955684.0000020918002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3523087270.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1779910260.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1668395234.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1778990439.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1765732103.000002839B602000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1775787220.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000002.1773163697.0000023BDEBE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1767938482.0000019C54E42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1775949797.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000002.1769289446.000001FB23C12000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1774386818.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1769582440.000002904BC52000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1776417055.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1777637531.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.1772006527.000001DC50A92000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1695695577.00000248ADE42000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1727589413.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.1771066252.000001D35A0B2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000012.00000002.1776033093.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.1769466887.000001CAEE262000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1771215742.0000026CFA222000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.3521166027.000002BED4882000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1776484924.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1771163576.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.1726303377.000001913F182000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1696549339.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1667472107.000001BC60BE2000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1776419485.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1769938139.000001F642762000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1766023435.0000012098002000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000002.1769892834.0000023CAA572000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.1778180373.00007FFDFAF02000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 2008, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 1544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6460, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4888, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 4916, type: MEMORYSTR |