Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000E763 lstrcpyA,lstrcatA,lstrcatA,FindFirstFileA,FindNextFileA,lstrcpyA,lstrcatA,lstrcatA,_stricmp,PathIsDirectoryA,#823,strcpy,strcpy,strchr,strchr,strchr,strcpy,atoi,CreateDirectoryA,Sleep,FindClose, | 4_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000D49E strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,strrchr,_stricmp,strcpy,FindClose,FindNextFileA,FindClose, | 4_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100058AC FindFirstFileA, | 4_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100069DD strcpy,strcat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 4_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000EBE4 strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 4_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10006DB7 strcpy,strcat,FindFirstFileA,wsprintfA,strlen,#825,FindNextFileA,FindClose, | 4_2_10006DB7 |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\ | Jump to behavior |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://%s.qzone.qq.com/main |
Source: rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://%s.qzone.qq.com/mainMozilla/4.0 |
Source: rundll32.exe, 00000004.00000002.4589013369.0000000002D5A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4589013369.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.143:12388/new_u.php |
Source: rundll32.exe, 00000004.00000002.4589013369.0000000002D5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.143:12388/new_u.php0 |
Source: rundll32.exe, 00000004.00000002.4589013369.0000000002D5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.143:12388/new_u.phpE% |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://107.163.56.241:18530/ |
Source: rundll32.exe, 00000004.00000002.4589013369.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.241:18530//joy.asp?sid=rungnejcmKqYndK2Fe5vteX8v2LUicbtudb8mteYnJeWnde |
Source: rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%s |
Source: rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%sfound~ |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/%s |
Source: rundll32.exe, 00000004.00000002.4590359464.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/%sMozilla/4.0 |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | String found in binary or memory: http://upx.sf.net |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100150F3 | 4_2_100150F3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000C15F | 4_2_1000C15F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000F200 | 4_2_1000F200 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100122E4 | 4_2_100122E4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003F541 | 4_2_1003F541 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001E5EC | 4_2_1001E5EC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10018642 | 4_2_10018642 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001A67B | 4_2_1001A67B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001D748 | 4_2_1001D748 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001C850 | 4_2_1001C850 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10015883 | 4_2_10015883 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10015B40 | 4_2_10015B40 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001DB5D | 4_2_1001DB5D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001DD4D | 4_2_1001DD4D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001BD60 | 4_2_1001BD60 |
Source: OL50O9ho5M.dll, type: SAMPLE | Matched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE | Matched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10005EBA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle, | 4_2_10005EBA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10005912 AdjustTokenPrivileges, | 4_2_10005912 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10007DDE #823,#823,#823,strrchr,strncpy,strncpy,GetSystemInfo,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,strlen,sscanf, | 4_2_10007DDE |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: strcpy,strcat,OpenSCManagerA,CreateServiceA,GetLastError,OpenServiceA,StartServiceA,wsprintfA,RegOpenKeyA,lstrlenA,RegSetValueExA,memset,wsprintfA,RegCreateKeyA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,memset,strcpy,RegOpenKeyExA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,RegCloseKey, | 4_2_1000ABAC |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\107.163.56.251:6658 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3300:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3840:120:WilError_03 |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5616 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3004:120:WilError_03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\M107.163.56.251:6658 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1364:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7148:120:WilError_03 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OL50O9ho5M.dll,GetIDTs | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll",#1 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll",GetIDTs | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5616 -s 1656 | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\OL50O9ho5M.dll",GetIDTs | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\OL50O9ho5M.dll",GetIDTs | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OL50O9ho5M.dll,GetIDTs | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll",GetIDTs | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003B01B push esp; mov dword ptr [esp], 801B5E30h | 4_2_1003B021 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003B010 push dword ptr [esp+4Ch]; retn 0050h | 4_2_1003B018 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1004C01C push dword ptr [esp+10h]; retn 0024h | 4_2_1004C038 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10001040 push dword ptr [esp]; mov dword ptr [esp], ebx | 4_2_10001064 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003C058 push dword ptr [esp+40h]; retn 0044h | 4_2_1003C073 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1005B0C8 push dword ptr [esp+30h]; retn 003Ch | 4_2_1005B0F8 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100210E0 push eax; ret | 4_2_1002110E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10064142 push dword ptr [esp+38h]; retn 003Ch | 4_2_10064155 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000C15F push dword ptr [esp+34h]; retn 0038h | 4_2_1003C95D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10001190 push 6810867Ah; mov dword ptr [esp], 078FD060h | 4_2_1000119E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1005B1BA push edi; ret | 4_2_1005B1DE |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000C1C2 pushfd ; mov dword ptr [esp], ecx | 4_2_1000C1D8 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1005C20A push ebx; retf 0005h | 4_2_1005C20B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003625C push 53DCB35Dh; mov dword ptr [esp], 0D616239h | 4_2_10036276 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10039298 push dword ptr [esp+38h]; retn 003Ch | 4_2_100392AD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100342C3 push edx; mov dword ptr [esp], eax | 4_2_100334C2 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100342C3 push 44A84A71h; mov dword ptr [esp], eax | 4_2_10033C36 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1005D35A push ds; iretd | 4_2_1005D36F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100343E4 push dword ptr [esp+28h]; retn 002Ch | 4_2_10034403 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1005F46C push dword ptr [esp+40h]; retn 0044h | 4_2_1005F477 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10062513 push eax; mov dword ptr [esp], 00000000h | 4_2_10062571 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1005E53D push eax; retf | 4_2_1005E53E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003560B push eax; mov dword ptr [esp], 00000000h | 4_2_10035669 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100366FE push 750DC817h; mov dword ptr [esp], esi | 4_2_1003670C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003578B push dword ptr [esp+38h]; retn 003Ch | 4_2_100357C0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100357AD push dword ptr [esp+38h]; retn 003Ch | 4_2_100357C0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100337F1 push dword ptr [esp+44h]; retn 0048h | 4_2_10034CE0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100608AB push dword ptr [esp+30h]; retn 003Ch | 4_2_100608C0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100628C7 pushfd ; mov dword ptr [esp], esp | 4_2_10063B2A |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100618DE pushfd ; mov dword ptr [esp], esp | 4_2_10063B2A |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1005B9B1 pushad ; mov dword ptr [esp], esp | 4_2_1005B9D6 |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\PING.EXE | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\PING.EXE | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\PING.EXE | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\PING.EXE | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000E763 lstrcpyA,lstrcatA,lstrcatA,FindFirstFileA,FindNextFileA,lstrcpyA,lstrcatA,lstrcatA,_stricmp,PathIsDirectoryA,#823,strcpy,strcpy,strchr,strchr,strchr,strcpy,atoi,CreateDirectoryA,Sleep,FindClose, | 4_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000D49E strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,strrchr,_stricmp,strcpy,FindClose,FindNextFileA,FindClose, | 4_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100058AC FindFirstFileA, | 4_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100069DD strcpy,strcat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 4_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000EBE4 strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 4_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10006DB7 strcpy,strcat,FindFirstFileA,wsprintfA,strlen,#825,FindNextFileA,FindClose, | 4_2_10006DB7 |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\ | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\ | Jump to behavior |
Source: Amcache.hve.17.dr | Binary or memory string: VMware |
Source: Amcache.hve.17.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.17.dr | Binary or memory string: VMware, Inc. |
Source: rundll32.exe, 00000004.00000002.4589013369.0000000002D5A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: indows\SysWOW64\SspiCli.dlles\Applications\\VMwareHostOpen. |
Source: Amcache.hve.17.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.17.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.17.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.17.dr | Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: rundll32.exe, 00000004.00000002.4589013369.0000000002D5A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4589013369.0000000002DE0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.17.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.17.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.17.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.17.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.17.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.17.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.17.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.17.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.17.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.17.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: rundll32.exe, 00000004.00000002.4589013369.0000000002DFB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWt? |
Source: Amcache.hve.17.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.17.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.17.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10006322 GetProcessHeap,HeapFree,_strnicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,CloseHandle,memset,strrchr,_strnicmp,CloseHandle,CloseHandle,lstrlenA,_strnicmp,OpenProcess,GetModuleFileNameExA,_strnicmp,GetCurrentProcess,DuplicateHandle,CloseHandle,CloseHandle,HeapFree, | 4_2_10006322 |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OL50O9ho5M.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx,memcpy, | 4_2_1000960F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: strlen,memset,___crtGetLocaleInfoEx,lstrcpyA, | 4_2_1000C295 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx, | 4_2_1000949C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: GetModuleFileNameA,GetModuleFileNameA,strrchr,strcat,strrchr,CreateMutexA,GetLastError,ReleaseMutex,CloseHandle,ReleaseMutex,CloseHandle,GetTickCount,srand,rand,rand,Sleep,SetFileAttributesA,wsprintfA,strcpy,strcat,strcat,Sleep,memset,strcat,strcat,strcat,MoveFileA,Concurrency::details::platform::__CreateTimerQueueTimer,___crtGetLocaleInfoEx,rand,rand,rand,rand,rand,rand,rand,MoveFileExA,Sleep,memset,___crtGetTimeFormatEx, | 4_2_1000D7E3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,#823,memset,___crtGetTimeFormatEx,GetLastError,??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,#823,MultiByteToWideChar,WideCharToMultiByte,#823,WideCharToMultiByte,#825,??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z,#825,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z,?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ,strlen,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,wsprintfA,strlen,#825,strrchr,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, | 4_2_10009A63 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,#823,memset,___crtGetTimeFormatEx,??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,#823,MultiByteToWideChar,WideCharToMultiByte,#823,WideCharToMultiByte,#825,??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z,#825,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z,?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ,strlen,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,wsprintfA,strlen,#825,strrchr,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, | 4_2_10009FAB |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | Binary or memory string: msmpeng.exe |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: Amcache.hve.LOG1.17.dr, Amcache.hve.17.dr | Binary or memory string: MsMpEng.exe |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10007225 WSAStartup,socket,socket,htons,inet_addr,htons,inet_addr,bind,ioctlsocket,select,WSAGetLastError,Sleep,memset,recvfrom,memset,wsprintfA,StrStrIA,StrStrIA,StrStrIA,StrStrIA,malloc,memcpy,memcpy,htons,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htonl,memcpy,htons,memcpy,inet_addr,inet_addr,memcpy,memcpy,sendto,closesocket,closesocket,WSACleanup, | 4_2_10007225 |