Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000E763 lstrcpyA,lstrcatA,lstrcatA,FindFirstFileA,FindNextFileA,lstrcpyA,lstrcatA,lstrcatA,_stricmp,PathIsDirectoryA,#823,strcpy,strcpy,strchr,strchr,strchr,strcpy,atoi,CreateDirectoryA,Sleep,FindClose, | 4_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000D49E strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,strrchr,_stricmp,strcpy,FindClose,FindNextFileA,FindClose, | 4_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100058AC FindFirstFileA, | 4_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100069DD strcpy,strcat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 4_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000EBE4 strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 4_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10006DB7 strcpy,strcat,FindFirstFileA,wsprintfA,strlen,#825,FindNextFileA,FindClose, | 4_2_10006DB7 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.43.143 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.251 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | TCP traffic detected without corresponding DNS query: 107.163.56.240 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10007225 WSAStartup,socket,socket,htons,inet_addr,htons,inet_addr,bind,ioctlsocket,select,WSAGetLastError,Sleep,memset,recvfrom,memset,wsprintfA,StrStrIA,StrStrIA,StrStrIA,StrStrIA,malloc,memcpy,memcpy,htons,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htonl,memcpy,htons,memcpy,inet_addr,inet_addr,memcpy,memcpy,sendto,closesocket,closesocket,WSACleanup, | 4_2_10007225 |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://%s.qzone.qq.com/main |
Source: rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://%s.qzone.qq.com/mainMozilla/4.0 |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.143:12388/new_u.php |
Source: rundll32.exe, 00000004.00000002.4426123512.00000000033F0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.43.143:12388/new_u.php$ |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240/ |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4427092707.00000000060FE000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4426123512.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4427048449.000000000607D000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4427187084.000000000631C000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4426123512.0000000003451000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003451000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php- |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003451000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.php3 |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpfsk |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:18963/main.phpi6r |
Source: rundll32.exe, 00000004.00000002.4427048449.000000000607D000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.240:1963/main.php |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://107.163.56.241:18530/ |
Source: rundll32.exe, 00000004.00000002.4426123512.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://107.163.56.241:18530//joy.asp?sid=rungnejcmKqYndK2Fe5vteX8v2LUicbtudb8mteYnteYnti |
Source: rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%s |
Source: rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://67.229.227.140:999/ver.asp?v=%sfound~ |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/NT |
Source: rundll32.exe, rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/%s |
Source: rundll32.exe, 00000004.00000002.4427386367.0000000010027000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/%sMozilla/4.0 |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003451000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/5762479093 |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/5762479093. |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/5762479093HsA |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003424000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://blog.sina.com.cn/u/5762479093ks |
Source: Amcache.hve.18.dr | String found in binary or memory: http://upx.sf.net |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100150F3 | 4_2_100150F3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000F200 | 4_2_1000F200 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100122E4 | 4_2_100122E4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1004650D | 4_2_1004650D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001E5EC | 4_2_1001E5EC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10018642 | 4_2_10018642 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001A67B | 4_2_1001A67B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001D748 | 4_2_1001D748 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001C850 | 4_2_1001C850 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10015883 | 4_2_10015883 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10015B40 | 4_2_10015B40 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001DB5D | 4_2_1001DB5D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10036CAA | 4_2_10036CAA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001DD4D | 4_2_1001DD4D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1001BD60 | 4_2_1001BD60 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: strcpy,strcat,OpenSCManagerA,CreateServiceA,GetLastError,OpenServiceA,StartServiceA,wsprintfA,RegOpenKeyA,lstrlenA,RegSetValueExA,memset,wsprintfA,RegCreateKeyA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,memset,strcpy,RegOpenKeyExA,_CxxThrowException,strlen,RegSetValueExA,SetLastError,_CxxThrowException,RegCloseKey,RegCloseKey, | 4_2_1000ABAC |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5432:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1924:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4040:120:WilError_03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\107.163.56.251:6658 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\0x5d65r455f |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5328:120:WilError_03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\M107.163.56.251:6658 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:776:120:WilError_03 |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4304 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\yKVQVNB2qI.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yKVQVNB2qI.dll",#1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yKVQVNB2qI.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\yKVQVNB2qI.dll,inflate | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yKVQVNB2qI.dll",inflate | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 1784 | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\yKVQVNB2qI.dll",inflate | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yKVQVNB2qI.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\yKVQVNB2qI.dll,inflate | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yKVQVNB2qI.dll",inflate | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yKVQVNB2qI.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100352AC pushfd ; mov dword ptr [esp], 9616A963h | 4_2_100352C9 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003B601 push dword ptr [esp+30h]; retn 0034h | 4_2_1003B661 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100357E9 push edx; mov dword ptr [esp], B873513Fh | 4_2_1003B0DF |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003B962 push 4DF288F7h; mov dword ptr [esp], 9616688Fh | 4_2_1003B97F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000CB08 push eax; mov dword ptr [esp], ECA52385h | 4_2_1004388C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10038020 push dword ptr [esp+30h]; retn 0034h | 4_2_1003802F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10038032 push edx; mov dword ptr [esp], 961659A5h | 4_2_10038033 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10001057 push dword ptr [esp+18h]; retn 001Ch | 4_2_10038071 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10038059 push dword ptr [esp+18h]; retn 001Ch | 4_2_10038071 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10001097 push dword ptr [esp+44h]; retn 0048h | 4_2_10034480 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100370C6 push es; ret | 4_2_100370CD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100010D7 pushfd ; mov dword ptr [esp], 9097BDA7h | 4_2_100346A7 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100210E0 push eax; ret | 4_2_1002110E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10070126 push dword ptr [esp+34h]; retn 0038h | 4_2_10070135 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10038128 push dword ptr [esp+38h]; retn 003Ch | 4_2_1003814B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000D183 push 74A6F5A1h; mov dword ptr [esp], ecx | 4_2_1000D189 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100011BD pushfd ; mov dword ptr [esp], ebx | 4_2_100011C7 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000C1E6 push dword ptr [esp+28h]; retn 002Ch | 4_2_10034380 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100342B8 push eax; mov dword ptr [esp], ebp | 4_2_100342D4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100342CE push eax; mov dword ptr [esp], ebp | 4_2_100342D4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100012CF push dword ptr [esp]; mov dword ptr [esp], 064C06CBh | 4_2_100012D3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100372F6 push 341038DCh; mov dword ptr [esp], E5677E7Ah | 4_2_10037308 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100352FF push dword ptr [esp+30h]; retn 0034h | 4_2_10035320 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10037319 push dword ptr [esp+3Ch]; retn 0040h | 4_2_10037360 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10035328 push dword ptr [esp+30h]; retn 0034h | 4_2_1003536C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10034343 push dword ptr [esp+28h]; retn 002Ch | 4_2_10034380 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003340C push dword ptr [esp+04h]; retn 0008h | 4_2_1003347B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003340C push dword ptr [esp+38h]; retn 003Ch | 4_2_100337CB |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003340C push dword ptr [esp+2Ch]; retn 0030h | 4_2_100341A9 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1007047E push dword ptr [esp+50h]; retn 0054h | 4_2_100704A4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1003548D push dword ptr [esp+2Ch]; retn 0030h | 4_2_100354D5 |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3 | |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6304 | Thread sleep time: -19800000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5948 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5948 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5948 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5948 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1364 | Thread sleep time: -300000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6304 | Thread sleep time: -1800000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5340 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1364 | Thread sleep time: -300000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2032 | Thread sleep time: -180000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000E763 lstrcpyA,lstrcatA,lstrcatA,FindFirstFileA,FindNextFileA,lstrcpyA,lstrcatA,lstrcatA,_stricmp,PathIsDirectoryA,#823,strcpy,strcpy,strchr,strchr,strchr,strcpy,atoi,CreateDirectoryA,Sleep,FindClose, | 4_2_1000E763 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000D49E strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,strrchr,_stricmp,strcpy,FindClose,FindNextFileA,FindClose, | 4_2_1000D49E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100058AC FindFirstFileA, | 4_2_100058AC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_100069DD strcpy,strcat,FindFirstFileA,wsprintfA,strlen,FindNextFileA,FindClose, | 4_2_100069DD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_1000EBE4 strlen,strcpy,strcat,strcat,FindFirstFileA,FindClose,strcpy,strcat,strcat,strcmp,strcmp,FindNextFileA,FindClose,FindNextFileA,FindClose, | 4_2_1000EBE4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10006DB7 strcpy,strcat,FindFirstFileA,wsprintfA,strlen,#825,FindNextFileA,FindClose, | 4_2_10006DB7 |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 1800000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 60000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 300000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 1800000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 300000 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread delayed: delay time: 180000 | Jump to behavior |
Source: Amcache.hve.18.dr | Binary or memory string: VMware |
Source: rundll32.exe, 00000004.00000002.4426005774.0000000002F7B000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: s\Applications\\VMwareHo |
Source: Amcache.hve.18.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.18.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.18.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.18.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.18.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.18.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.18.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.18.dr | Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003444000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.18.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.18.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.18.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: rundll32.exe, 00000004.00000002.4426123512.0000000003444000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW! |
Source: Amcache.hve.18.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: rundll32.exe, 00000004.00000002.4426123512.00000000033F0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWX |
Source: Amcache.hve.18.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.18.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.18.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.18.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.18.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.18.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.18.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.18.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: rundll32.exe, 00000004.00000002.4426123512.00000000033F0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ons\\VMwareHostO |
Source: Amcache.hve.18.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.18.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.18.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.18.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.18.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.18.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.18.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: rundll32.exe, 00000004.00000002.4426428388.0000000004F5E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ions\\VMwareHostOpen.exe |
Source: Amcache.hve.18.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx,memcpy, | 4_2_1000960F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,#823,memset,___crtGetTimeFormatEx,??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,#823,MultiByteToWideChar,WideCharToMultiByte,#823,WideCharToMultiByte,#825,??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z,#825,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z,?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ,strlen,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,wsprintfA,strlen,#825,strrchr,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, | 4_2_10009FAB |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: strlen,memset,___crtGetLocaleInfoEx,lstrcpyA, | 4_2_1000C295 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetTimeFormatEx,memset,___crtGetLocaleInfoEx, | 4_2_1000949C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: GetModuleFileNameA,GetModuleFileNameA,strrchr,strcat,strrchr,CreateMutexA,GetLastError,ReleaseMutex,CloseHandle,ReleaseMutex,CloseHandle,GetTickCount,srand,rand,rand,Sleep,SetFileAttributesA,wsprintfA,strcpy,strcat,strcat,Sleep,memset,strcat,strcat,strcat,MoveFileA,Concurrency::details::platform::__CreateTimerQueueTimer,___crtGetLocaleInfoEx,rand,rand,rand,rand,rand,rand,rand,MoveFileExA,Sleep,memset,___crtGetTimeFormatEx, | 4_2_1000D7E3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: memset,wsprintfA,#823,memset,___crtGetTimeFormatEx,GetLastError,??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z,memset,___crtGetLocaleInfoEx,MultiByteToWideChar,#823,MultiByteToWideChar,WideCharToMultiByte,#823,WideCharToMultiByte,#825,??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z,#825,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z,?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z,?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ,strlen,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,wsprintfA,strlen,#825,strrchr,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ,??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, | 4_2_10009A63 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 4_2_10007225 WSAStartup,socket,socket,htons,inet_addr,htons,inet_addr,bind,ioctlsocket,select,WSAGetLastError,Sleep,memset,recvfrom,memset,wsprintfA,StrStrIA,StrStrIA,StrStrIA,StrStrIA,malloc,memcpy,memcpy,htons,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htons,memcpy,htonl,memcpy,htons,memcpy,inet_addr,inet_addr,memcpy,memcpy,sendto,closesocket,closesocket,WSACleanup, | 4_2_10007225 |