Click to jump to signature section
Source: | Binary string: wntdll.pdbUGP source: BPD-003777.exe, 00000000.00000003.1342605000.0000000004330000.00000004.00001000.00020000.00000000.sdmp, BPD-003777.exe, 00000000.00000003.1342161692.0000000004330000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: BPD-003777.exe, 00000000.00000003.1342605000.0000000004330000.00000004.00001000.00020000.00000000.sdmp, BPD-003777.exe, 00000000.00000003.1342161692.0000000004330000.00000004.00001000.00020000.00000000.sdmp |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00464696 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00464696 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046C93C FindFirstFileW,FindClose, | 2_2_0046C93C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0046C9C7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0046F200 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0046F35D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0046F65E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00463A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00463A2B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00463D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00463D4E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0046BF27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0047425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, | 2_2_0047425A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00474458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, | 2_2_00474458 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0047425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, | 2_2_0047425A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00460219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState, | 2_2_00460219 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_0048CDAC |
Source: BPD-003777.exe, 00000000.00000002.1350657292.0000000000902000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_18dc1d61-b |
Source: BPD-003777.exe, 00000000.00000002.1350657292.0000000000902000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_c1c5fb21-7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: This is a third-party compiled AutoIt script. | 2_2_00403B4C |
Source: svchost.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: svchost.exe, 00000002.00000002.1613357439.00000000004B5000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_121972e4-f |
Source: svchost.exe, 00000002.00000002.1613357439.00000000004B5000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer | memstr_7c631f11-1 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048C27C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, | 2_2_0048C27C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048C220 NtdllDialogWndProc_W, | 2_2_0048C220 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048C49C PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W, | 2_2_0048C49C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048C788 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, | 2_2_0048C788 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048C86D SendMessageW,NtdllDialogWndProc_W, | 2_2_0048C86D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048C8EE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, | 2_2_0048C8EE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CB50 NtdllDialogWndProc_W, | 2_2_0048CB50 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CB7F NtdllDialogWndProc_W, | 2_2_0048CB7F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CBF9 NtdllDialogWndProc_W, | 2_2_0048CBF9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CBAE NtdllDialogWndProc_W, | 2_2_0048CBAE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CC2E ClientToScreen,NtdllDialogWndProc_W, | 2_2_0048CC2E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CD6C GetWindowLongW,NtdllDialogWndProc_W, | 2_2_0048CD6C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048CDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_0048CDAC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00401287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,74BFC8D0,NtdllDialogWndProc_W, | 2_2_00401287 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00401290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient, | 2_2_00401290 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040167D NtdllDialogWndProc_W, | 2_2_0040167D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00403633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, | 2_2_00403633 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048D6C6 NtdllDialogWndProc_W, | 2_2_0048D6C6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004016DE GetParent,NtdllDialogWndProc_W, | 2_2_004016DE |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004016B5 NtdllDialogWndProc_W, | 2_2_004016B5 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048D74C GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, | 2_2_0048D74C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040189B NtdllDialogWndProc_W, | 2_2_0040189B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048DA9A NtdllDialogWndProc_W, | 2_2_0048DA9A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048BF4D NtdllDialogWndProc_W,CallWindowProcW, | 2_2_0048BF4D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00458858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,74285590,CreateProcessAsUserW,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle, | 2_2_00458858 |
Source: C:\Users\user\Desktop\BPD-003777.exe | Code function: 0_2_03B42268 | 0_2_03B42268 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0048804A | 2_2_0048804A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040E060 | 2_2_0040E060 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00414140 | 2_2_00414140 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00422405 | 2_2_00422405 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00436522 | 2_2_00436522 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00480665 | 2_2_00480665 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0043267E | 2_2_0043267E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00416843 | 2_2_00416843 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040E800 | 2_2_0040E800 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0042283A | 2_2_0042283A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004389DF | 2_2_004389DF |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00418A0E | 2_2_00418A0E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00480AE2 | 2_2_00480AE2 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00436A94 | 2_2_00436A94 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0045EB07 | 2_2_0045EB07 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00468B13 | 2_2_00468B13 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0042CD61 | 2_2_0042CD61 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00437006 | 2_2_00437006 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0041710E | 2_2_0041710E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00413190 | 2_2_00413190 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00401287 | 2_2_00401287 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004233C7 | 2_2_004233C7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0042F419 | 2_2_0042F419 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004216C4 | 2_2_004216C4 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00415680 | 2_2_00415680 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004158C0 | 2_2_004158C0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004278D3 | 2_2_004278D3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0042DBB5 | 2_2_0042DBB5 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00421BB8 | 2_2_00421BB8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00439D05 | 2_2_00439D05 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0040FE40 | 2_2_0040FE40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00421FD0 | 2_2_00421FD0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0042BFE6 | 2_2_0042BFE6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00420D27 appears 70 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00428B40 appears 42 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00407F41 appears 35 times | |
Source: BPD-003777.exe, 00000000.00000003.1342605000.0000000004453000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs BPD-003777.exe |
Source: BPD-003777.exe, 00000000.00000003.1343729827.00000000045FD000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs BPD-003777.exe |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00458713 AdjustTokenPrivileges,CloseHandle, | 2_2_00458713 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00458CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, | 2_2_00458CC3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00464189 __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx, | 2_2_00464189 |
Source: unknown | Process created: C:\Users\user\Desktop\BPD-003777.exe "C:\Users\user\Desktop\BPD-003777.exe" | |
Source: C:\Users\user\Desktop\BPD-003777.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\BPD-003777.exe" | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8020 -s 560 | |
Source: C:\Users\user\Desktop\BPD-003777.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\BPD-003777.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: | Binary string: wntdll.pdbUGP source: BPD-003777.exe, 00000000.00000003.1342605000.0000000004330000.00000004.00001000.00020000.00000000.sdmp, BPD-003777.exe, 00000000.00000003.1342161692.0000000004330000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: BPD-003777.exe, 00000000.00000003.1342605000.0000000004330000.00000004.00001000.00020000.00000000.sdmp, BPD-003777.exe, 00000000.00000003.1342161692.0000000004330000.00000004.00001000.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\BPD-003777.exe | Code function: 0_2_00ABC910 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect, | 0_2_00ABC910 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00400686 push es; ret | 2_2_0040068D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00400B42 push es; ret | 2_2_00400B49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00428B85 push ecx; ret | 2_2_00428B98 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00404A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 2_2_00404A35 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004855FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 2_2_004855FD |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004233C7 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 2_2_004233C7 |
Source: C:\Users\user\Desktop\BPD-003777.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\BPD-003777.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00464696 GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00464696 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046C93C FindFirstFileW,FindClose, | 2_2_0046C93C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_0046C9C7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0046F200 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_0046F35D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0046F65E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00463A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00463A2B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00463D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00463D4E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0046BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_0046BF27 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00404AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, | 2_2_00404AFE |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19 |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00403B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, | 2_2_00403B4C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00435CCC RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer, | 2_2_00435CCC |
Source: C:\Users\user\Desktop\BPD-003777.exe | Code function: 0_2_00ABC910 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect, | 0_2_00ABC910 |
Source: C:\Users\user\Desktop\BPD-003777.exe | Code function: 0_2_03B420F8 mov eax, dword ptr fs:[00000030h] | 0_2_03B420F8 |
Source: C:\Users\user\Desktop\BPD-003777.exe | Code function: 0_2_03B40AD8 mov eax, dword ptr fs:[00000030h] | 0_2_03B40AD8 |
Source: C:\Users\user\Desktop\BPD-003777.exe | Code function: 0_2_03B42158 mov eax, dword ptr fs:[00000030h] | 0_2_03B42158 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004581F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, | 2_2_004581F7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0042A364 SetUnhandledExceptionFilter, | 2_2_0042A364 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0042A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_0042A395 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00403B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, | 2_2_00403B4C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00404A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 2_2_00404A35 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_004581F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, | 2_2_004581F7 |
Source: BPD-003777.exe, 00000000.00000002.1350657292.0000000000902000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, 00000002.00000002.1613357439.00000000004B5000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning |
Source: svchost.exe | Binary or memory string: Shell_TrayWnd |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_0043418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, | 2_2_0043418A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00404AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, | 2_2_00404AFE |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: MsMpEng.exe |
Source: svchost.exe | Binary or memory string: WIN_81 |
Source: svchost.exe | Binary or memory string: WIN_XP |
Source: BPD-003777.exe, 00000000.00000002.1350657292.0000000000902000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory |
Source: svchost.exe | Binary or memory string: WIN_XPe |
Source: svchost.exe | Binary or memory string: WIN_VISTA |
Source: svchost.exe | Binary or memory string: WIN_7 |
Source: svchost.exe | Binary or memory string: WIN_8 |
Source: svchost.exe, 00000002.00000002.1613357439.00000000004B5000.00000040.80000000.00040000.00000000.sdmp | Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00476596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, | 2_2_00476596 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 2_2_00476A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket, | 2_2_00476A5A |