Source: vm-uw.exe |
ReversingLabs: Detection: 71% |
Source: vm-uw.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: vm-uw.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: |
Binary string: srvany.pdb source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr |
Source: |
Binary string: srvany.pdbl"U source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr |
Source: |
Binary string: H:\Work\haozip\bin\Win32\release\pdb\HaoZip7zSetup.pdb source: vm-uw.exe |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Source: vm-uw.exe |
String found in binary or memory: https://haozip.2345.cc/ |
Source: C:\Windows\Fonts\systkm32\csrss.exe |
Code function: 9_2_00401070 OpenServiceA,GetLastError,DeleteService,GetLastError, |
9_2_00401070 |
Source: C:\Users\user\Desktop\vm-uw.exe |
File created: C:\Windows\Fonts\systkm32\ |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
File created: C:\Windows\Fonts\systkm32\vv.bat |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
File created: C:\Windows\Fonts\systkm32\csrss.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
File created: C:\Windows\Fonts\systkm32\svchost.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
File created: C:\Windows\Fonts\systkm32\1.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0020F8DE |
0_2_0020F8DE |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001F7C90 |
0_2_001F7C90 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001E1000 |
0_2_001E1000 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_002130A0 |
0_2_002130A0 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001FA160 |
0_2_001FA160 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022720E |
0_2_0022720E |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_00205306 |
0_2_00205306 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_002175E5 |
0_2_002175E5 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001EC600 |
0_2_001EC600 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022C6B9 |
0_2_0022C6B9 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022B6BC |
0_2_0022B6BC |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001EE680 |
0_2_001EE680 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001F68C0 |
0_2_001F68C0 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_00215958 |
0_2_00215958 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_002189EC |
0_2_002189EC |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_00217ADE |
0_2_00217ADE |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001E3B7E |
0_2_001E3B7E |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022DB44 |
0_2_0022DB44 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_00218BEC |
0_2_00218BEC |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022DBFE |
0_2_0022DBFE |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0020DC0C |
0_2_0020DC0C |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001F2C50 |
0_2_001F2C50 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_00217C58 |
0_2_00217C58 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0021FC5D |
0_2_0021FC5D |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022DD1B |
0_2_0022DD1B |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_00226D60 |
0_2_00226D60 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001F3D50 |
0_2_001F3D50 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_00218D8D |
0_2_00218D8D |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001F8F60 |
0_2_001F8F60 |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_01001493 |
18_2_01001493 |
Source: Joe Sandbox View |
Dropped File: C:\Windows\Fonts\systkm32\csrss.exe BBF4C224F9861B2C1F5A1364EE71E38728495B2709621763053B979BA88522F1 |
Source: vm-uw.exe |
Static PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79 |
Source: vm-uw.exe |
Static PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79 |
Source: vm-uw.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f |
Source: classification engine |
Classification label: mal96.troj.evad.winEXE@38/6@0/1 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001F3F50 FormatMessageW,_wcslen,_wcslen,LocalFree,GetLastError, |
0_2_001F3F50 |
Source: C:\Windows\Fonts\systkm32\csrss.exe |
Code function: CreateServiceA,GetLastError,CloseServiceHandle, |
9_2_00401000 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001E2777 _wcslen,CoCreateInstance,CoCreateInstance, |
0_2_001E2777 |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_01001D2C StartServiceCtrlDispatcherA,GetLastError,ExitProcess, |
18_2_01001D2C |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_01001D2C StartServiceCtrlDispatcherA,GetLastError,ExitProcess, |
18_2_01001D2C |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6428:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1808:120:WilError_03 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" " |
Source: vm-uw.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: vm-uw.exe |
ReversingLabs: Detection: 71% |
Source: unknown |
Process created: C:\Users\user\Desktop\vm-uw.exe "C:\Users\user\Desktop\vm-uw.exe" |
|
Source: C:\Users\user\Desktop\vm-uw.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" " |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\vm-uw.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\mode.com mode con: cols=16 lines=2 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\Fonts\systkm32\csrss.exe C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /f |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /f |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxc |
|
Source: unknown |
Process created: C:\Windows\Fonts\systkm32\svchost.exe C:\Windows\Fonts\systkm32\svchost.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\regini.exe regini 1.ini |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager |
|
Source: C:\Users\user\Desktop\vm-uw.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" " |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\mode.com mode con: cols=16 lines=2 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\Fonts\systkm32\csrss.exe C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxc |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\regini.exe regini 1.ini |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2 |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: pcacli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\mode.com |
Section loaded: ulib.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\mode.com |
Section loaded: ureg.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\mode.com |
Section loaded: fsutilext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\Fonts\systkm32\csrss.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Section loaded: licensemanagersvc.dll |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Section loaded: licensemanager.dll |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Section loaded: clipc.dll |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: vm-uw.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: vm-uw.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: vm-uw.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: vm-uw.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: vm-uw.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: vm-uw.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: vm-uw.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: vm-uw.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: |
Binary string: srvany.pdb source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr |
Source: |
Binary string: srvany.pdbl"U source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr |
Source: |
Binary string: H:\Work\haozip\bin\Win32\release\pdb\HaoZip7zSetup.pdb source: vm-uw.exe |
Source: vm-uw.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: vm-uw.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: vm-uw.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: vm-uw.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: vm-uw.exe |
Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001E51C0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_001E51C0 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0021BDB6 push ecx; ret |
0_2_0021BDC9 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022BE63 push ecx; ret |
0_2_0022BE76 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0022BE89 push ecx; ret |
0_2_0022BE76 |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_010021E0 push eax; ret |
18_2_010021F4 |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_010021E0 push eax; ret |
18_2_0100221C |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_0100225B push ecx; ret |
18_2_0100226B |
Source: C:\Windows\SysWOW64\cmd.exe |
Executable created and started: C:\Windows\Fonts\systkm32\csrss.exe |
Jump to behavior |
Source: unknown |
Executable created and started: C:\Windows\Fonts\systkm32\svchost.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: reg.exe |
Jump to behavior |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_01001D2C StartServiceCtrlDispatcherA,GetLastError,ExitProcess, |
18_2_01001D2C |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxc |
Source: C:\Users\user\Desktop\vm-uw.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2 |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: reg.exe, 0000000F.00000002.2184764355.0000000002890000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: C:\Windows\Fonts\systkm32\C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /freg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /fWinsta0\Default=::=::\=C:=C:\Windows\Fonts\systkm32=ExitCode=00000000ALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=user-PCComSpec=C:\Windows\system32\cmd.exeDriverData=C:\Windows\System32\Drivers\DriverDataFPS_BROWSER_APP_PROFILE_STRING=Internet ExplorerFPS_BROWSER_USER_PROFILE_STRING=DefaultHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\user-PCNUMBER_OF_PROCESSORS=2OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=x86PROCESSOR_ARCHITEW6432=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 143 Stepping 8, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=8f08ProgramData=C:\ProgramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPROMPT=$P$GPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\WindowsH |
Source: reg.exe, 0000000F.00000002.2184824190.0000000002A00000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: C:\Windows\Fonts\systkm32\C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /freg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /fWinsta0\Defaulta$Z |
Source: reg.exe, 0000000F.00000002.2184878475.0000000002D50000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: regaddHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters/vApplication/dC:\ProgramFiles(x86)\VMware\VMwareWorkstation\vmware.exe -x C:\Windows\Logs\ubu\3333.vmx/treg_sz/fOneDri |
Source: reg.exe, 0000000F.00000002.2184764355.0000000002890000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f |
Source: vv.bat.0.dr |
Binary or memory string: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0021BB7B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0021BB7B |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001E51C0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_001E51C0 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0021BB7B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0021BB7B |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0021BD0E SetUnhandledExceptionFilter, |
0_2_0021BD0E |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0021AFAC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_0021AFAC |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_0021EF9A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0021EF9A |
Source: C:\Windows\Fonts\systkm32\svchost.exe |
Code function: 18_2_0100229A SetUnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
18_2_0100229A |
Source: C:\Users\user\Desktop\vm-uw.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" " |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\mode.com mode con: cols=16 lines=2 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\Fonts\systkm32\csrss.exe C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxc |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\regini.exe regini 1.ini |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001E1CE0 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,InitializeCriticalSection, |
0_2_001E1CE0 |
Source: C:\Users\user\Desktop\vm-uw.exe |
Code function: 0_2_001E1D80 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ, |
0_2_001E1D80 |