Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E763 lstrcpy,lstrcat,lstrcat,FindFirstFileA,FindNextFileA,lstrcpy,lstrcat,lstrcat,_strcmpi,PathIsDirectoryA,6D0A2DD0,_mbscpy,_mbscpy,strchr,strchr,strchr,_mbscpy,atoi,CreateDirectoryA,Sleep,FindClose, | 3_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000D49E strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,strrchr,_strcmpi,_mbscpy,FindClose,FindNextFileA,FindClose, | 3_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100058AC FindFirstFileA, | 3_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100069DD _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 3_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000EBE4 strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 3_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10006DB7 _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,6D0A2C70,FindNextFileA,FindClose, | 3_2_10006DB7 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://%s.qzone.qq.com/main |
Source: rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://%s.qzone.qq.com/mainMozilla/4.0 |
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.161:12388/2112.html0U |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.161:12388/2112.htmlM |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.161:12388/2112.htmlg |
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240/ |
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240/sApps |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2912506439.0000000005DFD000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://107.163.56.240:18963/main.php |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php7 |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpF |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpO |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpT |
Source: rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phphttp://107.163.56.241:18530/www.shinhan.com |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpi |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phptP |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpu |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpz |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912617146.0000000010027000.00000040.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://107.163.56.241:18530/ |
Source: rundll32.exe, 00000003.00000002.2911707000.00000000030A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.241:18530//joy.asp?sid=rungnejcndvgnJLeFe5vteX8v2LUicbtudb8mteYmJe0nta |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%s |
Source: rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%sfound~ |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://blog.sina.com.cn/u/%s |
Source: rundll32.exe, 00000003.00000002.2912630221.0000000010029000.00000080.00000001.01000000.00000003.sdmp, Bcr1Wl2Jn0.dll | String found in binary or memory: http://blog.sina.com.cn/u/%sMozilla/4.0 |
Source: Amcache.hve.17.dr | String found in binary or memory: http://upx.sf.net |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100150F3 | 3_2_100150F3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000F200 | 3_2_1000F200 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100122E4 | 3_2_100122E4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001E5EC | 3_2_1001E5EC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10018642 | 3_2_10018642 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001A67B | 3_2_1001A67B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001D748 | 3_2_1001D748 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001C850 | 3_2_1001C850 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10015883 | 3_2_10015883 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10015B40 | 3_2_10015B40 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001DB5D | 3_2_1001DB5D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001DD4D | 3_2_1001DD4D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001BD60 | 3_2_1001BD60 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10005EBA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle, | 3_2_10005EBA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10005912 AdjustTokenPrivileges, | 3_2_10005912 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10007DDE 6D0A2DD0,6D0A2DD0,6D0A2DD0,strrchr,strncpy,strncpy,GetSystemInfo,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,strlen,sscanf, | 3_2_10007DDE |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _mbscpy,_mbscat,OpenSCManagerA,CreateServiceA,GetLastError,OpenServiceA,StartServiceA,wsprintfA,RegOpenKeyA,lstrlen,RegSetValueExA,memset,wsprintfA,RegCreateKeyA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,memset,_mbscpy,RegOpenKeyExA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,RegCloseKey, | 3_2_1000ABAC |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7972:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7624:120:WilError_03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\107.163.56.251:6658 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\M107.163.56.251:6658 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8120:120:WilError_03 |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7824 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7920:120:WilError_03 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Bcr1Wl2Jn0.dll,Scheduler | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7824 -s 1700 | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Bcr1Wl2Jn0.dll,Scheduler | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",Scheduler | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Bcr1Wl2Jn0.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000FEA3 push dword ptr [esp+3Ch]; retn 0040h | 3_2_10035AF1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001000 push dword ptr [esp+14h]; retn 0018h | 3_2_10036C9F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001000 push eax; mov dword ptr [esp], 63000AC9h | 3_2_10036D03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10033000 pushfd ; retf | 3_2_10033070 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001010 pushfd ; mov dword ptr [esp], edx | 3_2_10001011 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003407B push dword ptr [esp+50h]; retn 0054h | 3_2_10034085 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100210E0 push eax; ret | 3_2_1002110E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100010F9 push 4E1E2108h; mov dword ptr [esp], edx | 3_2_10001131 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100010F9 pushad ; mov dword ptr [esp], F651B473h | 3_2_10001136 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100010F9 push edx; mov dword ptr [esp], 1815BBB4h | 3_2_100342D5 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000D143 pushad ; mov dword ptr [esp], esi | 3_2_1000D15B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001199 pushfd ; mov dword ptr [esp], edx | 3_2_1000119A |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003442B pushfd ; mov dword ptr [esp], ecx | 3_2_10034436 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003442B push 1392E45Eh; mov dword ptr [esp], ecx | 3_2_1003443E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003448E push dword ptr [esp+24h]; retn 0028h | 3_2_100344A4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E56F push dword ptr [esp+2Ch]; retn 0030h | 3_2_1003882F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003463D push dword ptr [esp+34h]; retn 0038h | 3_2_10034E37 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000C792 push dword ptr [esp+48h]; retn 004Ch | 3_2_10033600 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000C7A8 push dword ptr [esp+48h]; retn 004Ch | 3_2_10033600 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B7BC pushfd ; mov dword ptr [esp], ebp | 3_2_10034F78 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B7CC push dword ptr [esp+34h]; retn 0038h | 3_2_10034E37 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003383A pushfd ; mov dword ptr [esp], esi | 3_2_1003384B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B8EA push 8C58C68Fh; mov dword ptr [esp], eax | 3_2_10033F47 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B8EA pushfd ; mov dword ptr [esp], eax | 3_2_100348EE |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10039A98 pushfd ; mov dword ptr [esp], 12F3A3B1h | 3_2_1003CFBC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10033AD2 pushfd ; mov dword ptr [esp], ecx | 3_2_10033ADD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10033AD2 push 8C58C68Fh; mov dword ptr [esp], eax | 3_2_10033F47 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E6EA pushfd ; mov dword ptr [esp], E0DA7D61h | 3_2_10034B0F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10034D73 pushfd ; mov dword ptr [esp], eax | 3_2_1000B84B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10034DF3 push dword ptr [esp+34h]; retn 0038h | 3_2_10034E37 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10035EA4 push dword ptr [esp+48h]; retn 004Ch | 3_2_1003BC28 |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E763 lstrcpy,lstrcat,lstrcat,FindFirstFileA,FindNextFileA,lstrcpy,lstrcat,lstrcat,_strcmpi,PathIsDirectoryA,6D0A2DD0,_mbscpy,_mbscpy,strchr,strchr,strchr,_mbscpy,atoi,CreateDirectoryA,Sleep,FindClose, | 3_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000D49E strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,strrchr,_strcmpi,_mbscpy,FindClose,FindNextFileA,FindClose, | 3_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100058AC FindFirstFileA, | 3_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100069DD _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 3_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000EBE4 strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 3_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10006DB7 _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,6D0A2C70,FindNextFileA,FindClose, | 3_2_10006DB7 |
Source: Amcache.hve.17.dr | Binary or memory string: VMware |
Source: Amcache.hve.17.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.17.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.17.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.17.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.17.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2911707000.00000000030C2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.17.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.17.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.17.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.17.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.17.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.17.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.17.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.17.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.17.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: rundll32.exe, 00000003.00000002.2911707000.000000000305A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ons\\VMwareHostO |
Source: Amcache.hve.17.dr | Binary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19 |
Source: Amcache.hve.17.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.17.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.17.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.17.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.17.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.17.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.17.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.17.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx,memcpy, | 3_2_1000960F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: strlen,memset,___crtGetLocaleInfoEx,lstrcpy, | 3_2_1000C295 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx, | 3_2_1000949C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: GetModuleFileNameA,GetModuleFileNameA,strrchr,_mbscat,strrchr,CreateMutexA,GetLastError,ReleaseMutex,CloseHandle,ReleaseMutex,CloseHandle,GetTickCount,srand,rand,rand,Sleep,SetFileAttributesA,wsprintfA,_mbscpy,_mbscat,_mbscat,Sleep,memset,_mbscat,_mbscat,_mbscat,MoveFileA,Concurrency::details::platform::__CreateTimerQueueTimer,___crtGetLocaleInfoEx,rand,rand,rand,rand,rand,rand,rand,MoveFileExA,Sleep,memset,___crtGetTimeFormatEx, | 3_2_1000D7E3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,6D0A2DD0,memset,___crtGetTimeFormatEx,GetLastError,6E6BACE0,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,6D0A2DD0,MultiByteToWideChar,WideCharToMultiByte,6D0A2DD0,WideCharToMultiByte,6D0A2C70,6E6C0850,6D0A2C70,6E6CDC60,6E6CDC60,6E6D4490,6E6C9380,strlen,6E6BC7F0,6E6BC7F0,wsprintfA,strlen,6D0A2C70,strrchr,6E6BC7F0,6E6BC7F0, | 3_2_10009A63 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,6D0A2DD0,memset,___crtGetTimeFormatEx,6E6BACE0,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,6D0A2DD0,MultiByteToWideChar,WideCharToMultiByte,6D0A2DD0,WideCharToMultiByte,6D0A2C70,6E6C0850,6D0A2C70,6E6CDC60,6E6CDC60,6E6D4490,6E6C9380,strlen,6E6BC7F0,6E6BC7F0,wsprintfA,strlen,6D0A2C70,strrchr,6E6BC7F0,6E6BC7F0,6E6BC7F0,6E6BC7F0, | 3_2_10009FAB |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10007225 WSAStartup,socket,socket,htons,inet_addr,htons,inet_addr,bind,ioctlsocket,select,WSAGetLastError,Sleep,memset,recvfrom,memset,wsprintfA,StrStrIA,StrStrIA,StrStrIA,StrStrIA,malloc,memcpy,memcpy,htons,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htonl,memcpy,htons,memcpy,inet_addr,inet_addr,memcpy,memcpy,sendto,closesocket,closesocket,WSACleanup, | 3_2_10007225 |