Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E763 lstrcpy,lstrcat,lstrcat,FindFirstFileA,FindNextFileA,lstrcpy,lstrcat,lstrcat,_strcmpi,PathIsDirectoryA,6CB72DD0,_mbscpy,_mbscpy,strchr,strchr,strchr,_mbscpy,atoi,CreateDirectoryA,Sleep,FindClose, | 3_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000D49E strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,strrchr,_strcmpi,_mbscpy,FindClose,FindNextFileA,FindClose, | 3_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100058AC FindFirstFileA, | 3_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100069DD _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 3_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000EBE4 strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 3_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10006DB7 _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 3_2_10006DB7 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.161 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10007225 WSAStartup,socket,socket,htons,inet_addr,htons,inet_addr,bind,ioctlsocket,select,WSAGetLastError,Sleep,memset,recvfrom,memset,wsprintfA,StrStrIA,StrStrIA,StrStrIA,StrStrIA,malloc,memcpy,memcpy,htons,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htonl,memcpy,htons,memcpy,inet_addr,inet_addr,memcpy,memcpy,sendto,closesocket,closesocket,WSACleanup, | 3_2_10007225 |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.3054777269.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://%s.qzone.qq.com/main |
Source: rundll32.exe, 00000003.00000002.3054777269.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://%s.qzone.qq.com/mainMozilla/4.0 |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.161:12388/2112.html |
Source: rundll32.exe, 00000003.00000002.3053174241.00000000005FA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.161:12388/2112.html0 |
Source: rundll32.exe, 00000003.00000002.3053848370.000000000453D000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.161:1388/2112.html |
Source: rundll32.exe, 00000003.00000002.3054395701.000000000529D000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000682000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php-g |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php? |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000682000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpAg |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpF |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000682000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpYg |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpg |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000682000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpig- |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpq |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpt |
Source: rundll32.exe, 00000003.00000002.3054395701.000000000529D000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963main.php |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.3054777269.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://107.163.56.241:18530/ |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.241:18530//joy.asp?sid=rungnejcrueXntG4Fe5vteX8v2LUicbtudb8mteYmJe0nta |
Source: rundll32.exe, 00000003.00000002.3054347371.000000000521D000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56I |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.3054777269.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%s |
Source: rundll32.exe, 00000003.00000002.3054777269.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%sfound~ |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.3054777269.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/%s |
Source: rundll32.exe, 00000003.00000002.3054777269.0000000010027000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/%sMozilla/4.0 |
Source: rundll32.exe, 00000003.00000002.3054681983.00000000056DD000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3053174241.000000000065D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3053174241.000000000069A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/5762479093 |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000682000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/57624790937g |
Source: rundll32.exe, 00000003.00000002.3053174241.0000000000682000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/5762479093Gg |
Source: rundll32.exe, 00000003.00000002.3053174241.000000000069A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/5762479093JZ |
Source: Amcache.hve.21.dr | String found in binary or memory: http://upx.sf.net |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100150F3 | 3_2_100150F3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000F200 | 3_2_1000F200 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100122E4 | 3_2_100122E4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001E5EC | 3_2_1001E5EC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10018642 | 3_2_10018642 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001A67B | 3_2_1001A67B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001D748 | 3_2_1001D748 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001C850 | 3_2_1001C850 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10015883 | 3_2_10015883 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10015B40 | 3_2_10015B40 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001DB5D | 3_2_1001DB5D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001DD4D | 3_2_1001DD4D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1001BD60 | 3_2_1001BD60 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _mbscpy,_mbscat,OpenSCManagerA,CreateServiceA,GetLastError,OpenServiceA,StartServiceA,wsprintfA,RegOpenKeyA,lstrlen,RegSetValueExA,memset,wsprintfA,RegCreateKeyA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,memset,_mbscpy,RegOpenKeyExA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,RegCloseKey, | 3_2_1000ABAC |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3064:120:WilError_03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\107.163.56.251:6658 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\0x5d65r455f |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5924:120:WilError_03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\M107.163.56.251:6658 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:928:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5928:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1712:120:WilError_03 |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5316 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\gmqIbj35WF.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gmqIbj35WF.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\gmqIbj35WF.dll,Scheduler | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gmqIbj35WF.dll",#1 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gmqIbj35WF.dll",Scheduler | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\gmqIbj35WF.dll",Scheduler | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 1792 | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\gmqIbj35WF.dll",Scheduler | |
Source: C:\Windows\SysWOW64\PING.EXE | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gmqIbj35WF.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\gmqIbj35WF.dll,Scheduler | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gmqIbj35WF.dll",Scheduler | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gmqIbj35WF.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000FEA3 push dword ptr [esp+3Ch]; retn 0040h | 3_2_10035AF1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001000 push dword ptr [esp+14h]; retn 0018h | 3_2_10036C9F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001000 push eax; mov dword ptr [esp], 63000AC9h | 3_2_10036D03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001010 pushfd ; mov dword ptr [esp], edx | 3_2_10001011 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003407B push dword ptr [esp+50h]; retn 0054h | 3_2_10034085 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100210E0 push eax; ret | 3_2_1002110E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100010F9 push 4E1E2108h; mov dword ptr [esp], edx | 3_2_10001131 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100010F9 pushad ; mov dword ptr [esp], F651B473h | 3_2_10001136 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100010F9 push edx; mov dword ptr [esp], 1815BBB4h | 3_2_100342D5 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000D143 pushad ; mov dword ptr [esp], esi | 3_2_1000D15B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10001199 pushfd ; mov dword ptr [esp], edx | 3_2_1000119A |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003442B pushfd ; mov dword ptr [esp], ecx | 3_2_10034436 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003442B push 1392E45Eh; mov dword ptr [esp], ecx | 3_2_1003443E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003448E push dword ptr [esp+24h]; retn 0028h | 3_2_100344A4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E56F push dword ptr [esp+2Ch]; retn 0030h | 3_2_1003882F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003463D push dword ptr [esp+34h]; retn 0038h | 3_2_10034E37 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000C792 push dword ptr [esp+48h]; retn 004Ch | 3_2_10033600 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000C7A8 push dword ptr [esp+48h]; retn 004Ch | 3_2_10033600 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B7BC pushfd ; mov dword ptr [esp], ebp | 3_2_10034F78 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B7CC push dword ptr [esp+34h]; retn 0038h | 3_2_10034E37 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1003383A pushfd ; mov dword ptr [esp], esi | 3_2_1003384B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B8EA push 8C58C68Fh; mov dword ptr [esp], eax | 3_2_10033F47 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000B8EA pushfd ; mov dword ptr [esp], eax | 3_2_100348EE |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10039A98 pushfd ; mov dword ptr [esp], 12F3A3B1h | 3_2_1003CFBC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10033AD2 pushfd ; mov dword ptr [esp], ecx | 3_2_10033ADD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10033AD2 push 8C58C68Fh; mov dword ptr [esp], eax | 3_2_10033F47 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E6EA pushfd ; mov dword ptr [esp], E0DA7D61h | 3_2_10034B0F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10034D73 pushfd ; mov dword ptr [esp], eax | 3_2_1000B84B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10034DF3 push dword ptr [esp+34h]; retn 0038h | 3_2_10034E37 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10035EA4 push dword ptr [esp+48h]; retn 004Ch | 3_2_1003BC28 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10034EB4 push A20C73A1h; mov dword ptr [esp], edx | 3_2_10034EF9 |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 1800000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 300000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 180000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 1800000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 180000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 300000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6664 | Thread sleep time: -14400000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1612 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1612 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1612 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 744 | Thread sleep time: -3300000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3052 | Thread sleep time: -180000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4192 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2504 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6664 | Thread sleep time: -1800000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3052 | Thread sleep time: -180000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 744 | Thread sleep time: -300000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5608 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000E763 lstrcpy,lstrcat,lstrcat,FindFirstFileA,FindNextFileA,lstrcpy,lstrcat,lstrcat,_strcmpi,PathIsDirectoryA,6CB72DD0,_mbscpy,_mbscpy,strchr,strchr,strchr,_mbscpy,atoi,CreateDirectoryA,Sleep,FindClose, | 3_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000D49E strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,strrchr,_strcmpi,_mbscpy,FindClose,FindNextFileA,FindClose, | 3_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100058AC FindFirstFileA, | 3_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_100069DD _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 3_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_1000EBE4 strlen,_mbscpy,_mbscat,_mbscat,FindFirstFileA,FindClose,_mbscpy,_mbscat,_mbscat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 3_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10006DB7 _mbscpy,_mbscat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 3_2_10006DB7 |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 1800000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 60000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 300000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 180000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 1800000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 180000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 300000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: Amcache.hve.21.dr | Binary or memory string: VMware |
Source: Amcache.hve.21.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.21.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.21.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.21.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.21.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.21.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.21.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: rundll32.exe, 00000003.00000002.3053174241.000000000065D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3053174241.0000000000629000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.21.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: rundll32.exe, 00000003.00000002.3052955693.00000000000FB000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: s\Applications\\VMwareHo@ |
Source: Amcache.hve.21.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.21.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.21.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.21.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.21.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.21.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.21.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.21.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.21.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.21.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.21.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.21.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: rundll32.exe, 00000003.00000002.3053174241.00000000005FA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ons\\VMwareHostO |
Source: Amcache.hve.21.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.21.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.21.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.21.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.21.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.21.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.21.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.21.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx,memcpy, | 3_2_1000960F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,6CB72DD0,memset,___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,6CB72DD0,MultiByteToWideChar,WideCharToMultiByte,6CB72DD0,WideCharToMultiByte,strlen,6CAEC7F0,6CAEC7F0,wsprintfA,strlen,strrchr,6CAEC7F0,6CAEC7F0,6CAEC7F0,6CAEC7F0, | 3_2_10009FAB |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: strlen,memset,___crtGetLocaleInfoEx,lstrcpy, | 3_2_1000C295 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx, | 3_2_1000949C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: GetModuleFileNameA,GetModuleFileNameA,strrchr,_mbscat,strrchr,CreateMutexA,GetLastError,ReleaseMutex,CloseHandle,ReleaseMutex,CloseHandle,GetTickCount,srand,rand,rand,Sleep,SetFileAttributesA,wsprintfA,_mbscpy,_mbscat,_mbscat,Sleep,memset,_mbscat,_mbscat,_mbscat,MoveFileA,Concurrency::details::platform::__CreateTimerQueueTimer,___crtGetLocaleInfoEx,rand,rand,rand,rand,rand,rand,rand,MoveFileExA,Sleep,memset,___crtGetTimeFormatEx, | 3_2_1000D7E3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,6CB72DD0,memset,___crtGetTimeFormatEx,GetLastError,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,6CB72DD0,MultiByteToWideChar,WideCharToMultiByte,6CB72DD0,WideCharToMultiByte,strlen,6CAEC7F0,6CAEC7F0,wsprintfA,strlen,strrchr,6CAEC7F0,6CAEC7F0, | 3_2_10009A63 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_10007225 WSAStartup,socket,socket,htons,inet_addr,htons,inet_addr,bind,ioctlsocket,select,WSAGetLastError,Sleep,memset,recvfrom,memset,wsprintfA,StrStrIA,StrStrIA,StrStrIA,StrStrIA,malloc,memcpy,memcpy,htons,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htonl,memcpy,htons,memcpy,inet_addr,inet_addr,memcpy,memcpy,sendto,closesocket,closesocket,WSACleanup, | 3_2_10007225 |