Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.204.213.99 |
Source: Amcache.hve.8.dr |
String found in binary or memory: http://upx.sf.net |
Source: rundll32.exe, 00000003.00000003.1739047373.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2008105051.000000000284A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dcttx.com/19/7.txt |
Source: rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dcttx.com/19/7.txt. |
Source: rundll32.exe, 00000003.00000002.2008105051.000000000284A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dcttx.com/19/7.txtD |
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4184561254.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.4183830787.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, HLMJbase.dll |
String found in binary or memory: https://dcttx.com/19/7.txtFailed |
Source: rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dcttx.com/19/7.txtp |
Source: rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1739047373.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1738900816.00000000028C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738731092.0000000002D12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1768941964.0000000002CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4176037293.0000000002C9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1833709462.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763620953.00000000027C1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1844676174.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2355356834.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2891476609.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795184851.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3064884794.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4176187047.000000000276C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2739932660.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795350329.0000000002785000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dcttx.com/19/77.bin |
Source: rundll32.exe, 00000003.00000002.2008196874.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dcttx.com/19/77.bin. |
Source: rundll32.exe, 00000003.00000002.2008196874.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://dcttx.com/19/77.binH |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBD6D3C |
3_2_6CBD6D3C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBB481F |
3_2_6CBB481F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBBAA6C |
3_2_6CBBAA6C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBA8469 |
3_2_6CBA8469 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBD9CA8 |
3_2_6CBD9CA8 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBB1C98 |
3_2_6CBB1C98 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB614AB |
3_2_6CB614AB |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBC90A8 |
3_2_6CBC90A8 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CC02C95 |
3_2_6CC02C95 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBF4CCF |
3_2_6CBF4CCF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBA2D0F |
3_2_6CBA2D0F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB8EE05 |
3_2_6CB8EE05 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB7CF24 |
3_2_6CB7CF24 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBF4898 |
3_2_6CBF4898 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBB28F9 |
3_2_6CBB28F9 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CC02893 |
3_2_6CC02893 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB9A814 |
3_2_6CB9A814 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB6E875 |
3_2_6CB6E875 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB6CAD0 |
3_2_6CB6CAD0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBB8A77 |
3_2_6CBB8A77 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB90B40 |
3_2_6CB90B40 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB68430 |
3_2_6CB68430 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB9653C |
3_2_6CB9653C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBFA508 |
3_2_6CBFA508 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB9255C |
3_2_6CB9255C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBDC6DA |
3_2_6CBDC6DA |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB666D9 |
3_2_6CB666D9 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB7A64D |
3_2_6CB7A64D |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBE8780 |
3_2_6CBE8780 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBC4719 |
3_2_6CBC4719 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB7C1AC |
3_2_6CB7C1AC |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBE41F0 |
3_2_6CBE41F0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBA6291 |
3_2_6CBA6291 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB8E3C7 |
3_2_6CB8E3C7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBF2350 |
3_2_6CBF2350 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBDDC97 |
3_2_6CBDDC97 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CC03CF4 |
3_2_6CC03CF4 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBDDCEB |
3_2_6CBDDCEB |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBDDC7A |
3_2_6CBDDC7A |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB6BDB1 |
3_2_6CB6BDB1 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB61DF7 |
3_2_6CB61DF7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB79D26 |
3_2_6CB79D26 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBDBD1C |
3_2_6CBDBD1C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBEBD70 |
3_2_6CBEBD70 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB8DD45 |
3_2_6CB8DD45 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB85E16 |
3_2_6CB85E16 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBEDFFE |
3_2_6CBEDFFE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBC3F75 |
3_2_6CBC3F75 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBE9F40 |
3_2_6CBE9F40 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CC018D7 |
3_2_6CC018D7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBBBA52 |
3_2_6CBBBA52 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBF9BE5 |
3_2_6CBF9BE5 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBD5B14 |
3_2_6CBD5B14 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB854EF |
3_2_6CB854EF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBE347E |
3_2_6CBE347E |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBAB537 |
3_2_6CBAB537 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB6F61C |
3_2_6CB6F61C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBA5674 |
3_2_6CBA5674 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CB7D0F7 |
3_2_6CB7D0F7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBE1060 |
3_2_6CBE1060 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CC0524A |
3_2_6CC0524A |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBCD246 |
3_2_6CBCD246 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CBE9370 |
3_2_6CBE9370 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048E0CAE |
4_2_048E0CAE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048D24B0 |
4_2_048D24B0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048E11FF |
4_2_048E11FF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048E2D61 |
4_2_048E2D61 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048DB6A6 |
4_2_048DB6A6 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048E1E2C |
4_2_048E1E2C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048E1750 |
4_2_048E1750 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C6E60 |
4_2_054C6E60 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C6BE0 |
4_2_054C6BE0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054DDDF0 |
4_2_054DDDF0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C24A0 |
4_2_054C24A0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054DF9FF |
4_2_054DF9FF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C8870 |
4_2_054C8870 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054DD89F |
4_2_054DD89F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054DE341 |
4_2_054DE341 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054D8381 |
4_2_054D8381 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054DEA1D |
4_2_054DEA1D |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04CF659F |
4_2_04CF659F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04D07D40 |
4_2_04D07D40 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04D0DD00 |
4_2_04D0DD00 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04CF1E5F |
4_2_04CF1E5F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04D0D7AF |
4_2_04D0D7AF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04CF681F |
4_2_04CF681F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04D0D25E |
4_2_04D0D25E |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04CF822F |
4_2_04CF822F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04D0F3BE |
4_2_04D0F3BE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_043324B0 |
5_2_043324B0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04340CAE |
5_2_04340CAE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04342D61 |
5_2_04342D61 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_043411FF |
5_2_043411FF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04341E2C |
5_2_04341E2C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_0433B6A6 |
5_2_0433B6A6 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04341750 |
5_2_04341750 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E86E60 |
5_2_04E86E60 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E86BE0 |
5_2_04E86BE0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E824A0 |
5_2_04E824A0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E9DDF0 |
5_2_04E9DDF0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04EA978D |
5_2_04EA978D |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E9D89F |
5_2_04E9D89F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E88870 |
5_2_04E88870 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E9F9FF |
5_2_04E9F9FF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E9EA1D |
5_2_04E9EA1D |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E98381 |
5_2_04E98381 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E9E341 |
5_2_04E9E341 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046D7D40 |
5_2_046D7D40 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046DDD00 |
5_2_046DDD00 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046C659F |
5_2_046C659F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046C1E5F |
5_2_046C1E5F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046DD7AF |
5_2_046DD7AF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046C681F |
5_2_046C681F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046DD25E |
5_2_046DD25E |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046C822F |
5_2_046C822F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046DF3BE |
5_2_046DF3BE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C75A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess, |
4_2_054C75A0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C76C0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges, |
4_2_054C76C0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C7AF0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle, |
4_2_054C7AF0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E875A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess, |
5_2_04E875A0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E876C0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges, |
5_2_04E876C0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E87AF0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle, |
5_2_04E87AF0 |
Source: unknown |
Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\HLMJbase.dll" |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\HLMJbase.dll,NvOptimusEnablement |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",NvOptimusEnablement |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 724 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\HLMJbase.dll,NvOptimusEnablement |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",NvOptimusEnablement |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048E7AFE push eax; retn 0000h |
4_2_048E7B05 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048D9EF5 push ecx; ret |
4_2_048D9F08 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054E2443 push ebp; retf |
4_2_054E2474 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054E2450 push ebp; retf |
4_2_054E2474 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054E2470 push ebp; retf |
4_2_054E2474 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054EA168 push eax; ret |
4_2_054EA119 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054EA0B8 push eax; ret |
4_2_054EA119 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054D4325 push ecx; ret |
4_2_054D4338 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_04D03CE4 push ecx; ret |
4_2_04D03CF7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04339EF5 push ecx; ret |
5_2_04339F08 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04347AFF push eax; retn 0000h |
5_2_04347B05 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04EA2470 push ebp; retf |
5_2_04EA2474 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04EA245F push ebp; retf |
5_2_04EA2474 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04EAA0B8 push eax; ret |
5_2_04EAA119 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04EAA168 push eax; ret |
5_2_04EAA119 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E94325 push ecx; ret |
5_2_04E94338 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_046D3CE4 push ecx; ret |
5_2_046D3CF7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.8.dr |
Binary or memory string: vmci.syshbin |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware, Inc. |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.8.dr |
Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.8.dr |
Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.8.dr |
Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.8.dr |
Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.8.dr |
Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.8.dr |
Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.8.dr |
Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2008105051.000000000286D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770502384.000000000286D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1738954589.000000000286D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1770216842.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738806367.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4176037293.0000000002C9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1833709462.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1844676174.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795518550.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795184851.000000000276D000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Amcache.hve.8.dr |
Binary or memory string: vmci.sys |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.8.dr |
Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.8.dr |
Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.8.dr |
Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware20,1 |
Source: Amcache.hve.8.dr |
Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.8.dr |
Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.8.dr |
Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.8.dr |
Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.8.dr |
Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.8.dr |
Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.8.dr |
Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.8.dr |
Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CC01C22 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
3_2_6CC01C22 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6CC016E3 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
3_2_6CC016E3 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048D6530 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep, |
4_2_048D6530 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048D69D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
4_2_048D69D5 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048D8678 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
4_2_048D8678 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_048DAFAE SetUnhandledExceptionFilter, |
4_2_048DAFAE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054CDE70 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,Sleep,RegOpenKeyExW,RegQueryValueExW,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,WaitForSingleObject,CloseHandle,Sleep,CloseHandle, |
4_2_054CDE70 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054CEF64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
4_2_054CEF64 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054D1EC7 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
4_2_054D1EC7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04336530 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep, |
5_2_04336530 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_043369D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
5_2_043369D5 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04338678 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
5_2_04338678 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_0433AFAE SetUnhandledExceptionFilter, |
5_2_0433AFAE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E8DE70 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,Sleep,RegOpenKeyExW,RegQueryValueExW,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,WaitForSingleObject,CloseHandle,Sleep,CloseHandle, |
5_2_04E8DE70 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E91EC7 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
5_2_04E91EC7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E8EF64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
5_2_04E8EF64 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 4_2_054C7760 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, |
4_2_054C7760 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 5_2_04E87760 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, |
5_2_04E87760 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\SysWOW64\svchost.exe |
4_2_054C7760 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe |
4_2_054C7760 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\SysWOW64\svchost.exe |
5_2_04E87760 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe |
5_2_04E87760 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW, |
4_2_054C53C0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW, |
5_2_04E853C0 |
Source: rundll32.exe |
Binary or memory string: acs.exe |
Source: rundll32.exe |
Binary or memory string: avcenter.exe |
Source: rundll32.exe |
Binary or memory string: kxetray.exe |
Source: rundll32.exe |
Binary or memory string: vsserv.exe |
Source: rundll32.exe |
Binary or memory string: cfp.exe |
Source: rundll32.exe |
Binary or memory string: avp.exe |
Source: rundll32.exe |
Binary or memory string: KSafeTray.exe |
Source: Amcache.hve.8.dr |
Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.8.dr |
Binary or memory string: msmpeng.exe |
Source: Amcache.hve.8.dr |
Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: rundll32.exe |
Binary or memory string: 360Safe.exe |
Source: rundll32.exe |
Binary or memory string: 360tray.exe |
Source: rundll32.exe |
Binary or memory string: rtvscan.exe |
Source: rundll32.exe |
Binary or memory string: TMBMSRV.exe |
Source: rundll32.exe |
Binary or memory string: ashDisp.exe |
Source: rundll32.exe |
Binary or memory string: 360Tray.exe |
Source: rundll32.exe |
Binary or memory string: avgwdsvc.exe |
Source: rundll32.exe |
Binary or memory string: AYAgent.aye |
Source: rundll32.exe |
Binary or memory string: RavMonD.exe |
Source: rundll32.exe |
Binary or memory string: QUHLPSVC.EXE |
Source: Amcache.hve.8.dr |
Binary or memory string: MsMpEng.exe |
Source: rundll32.exe |
Binary or memory string: Mcshield.exe |
Source: rundll32.exe |
Binary or memory string: K7TSecurity.exe |