Source: regsvr32.exe, 00000002.00000003.779376557.000000000362E000.00000004.00000001.sdmp, explorer.exe, 00000020.00000000.850009124.000000000FCFE000.00000004.00000001.sdmp | String found in binary or memory: http://api10.laptok.at/api1/_2FrbYdUuuog2_2Ft/o0Q4kJ3uiNvB/BVkhCT_2FjP/kgnCFaoGSZ_2FP/XoK_2BtWhs_2FN |
Source: explorer.exe, 00000020.00000000.850009124.000000000FCFE000.00000004.00000001.sdmp | String found in binary or memory: http://api10.laptok.at/api1/soyCaKjlo/B74XWyII6dEV1I0Co4Ut/l9VT5RjBdu9gqXWslrY/xc_2FK3McGJ0IzvFP1vJk |
Source: powershell.exe, 00000017.00000003.823839422.000001F6E1200000.00000004.00000001.sdmp, explorer.exe, 00000020.00000002.1032085877.0000000004DDE000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txt |
Source: powershell.exe, 00000017.00000003.823839422.000001F6E1200000.00000004.00000001.sdmp, explorer.exe, 00000020.00000002.1032085877.0000000004DDE000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txtC: |
Source: powershell.exe, 00000017.00000003.823839422.000001F6E1200000.00000004.00000001.sdmp, explorer.exe, 00000020.00000002.1032085877.0000000004DDE000.00000004.00000001.sdmp | String found in binary or memory: http://https://file://USER.ID%lu.exe/upd |
Source: powershell.exe, 00000017.00000002.887499451.000001F6D8B95000.00000004.00000001.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000017.00000002.860212545.000001F6C8D40000.00000004.00000001.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000017.00000002.859665043.000001F6C8B31000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: explorer.exe, 00000020.00000002.1020876214.0000000002B50000.00000002.00000001.sdmp | String found in binary or memory: http://www.%s.comPA |
Source: powershell.exe, 00000017.00000002.860212545.000001F6C8D40000.00000004.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000017.00000003.858426776.000001F6E137C000.00000004.00000001.sdmp | String found in binary or memory: http://www.microsoft.co |
Source: powershell.exe, 00000017.00000002.887499451.000001F6D8B95000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000017.00000002.887499451.000001F6D8B95000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000017.00000002.887499451.000001F6D8B95000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000017.00000002.860212545.000001F6C8D40000.00000004.00000001.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000017.00000002.887499451.000001F6D8B95000.00000004.00000001.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: explorer.exe, 00000020.00000000.844032000.000000000A897000.00000004.00000001.sdmp | String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp |
Source: Yara match | File source: 00000017.00000003.823839422.000001F6E1200000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756834396.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.757094154.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.765016021.0000000005DAB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756986766.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.757116216.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756877993.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.757051571.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000020.00000002.1032085877.0000000004DDE000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000003.833217497.0000018E99E50000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.1022176574.000001DA4C29E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000003.846762687.000001E7A4180000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000020.00000003.843217682.0000000002B30000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000022.00000002.1023033064.0000027D4F83E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756945473.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.847443722.0000000000DDE000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.825598679.0000000003470000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.848064727.000001E7A436E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.845341823.0000000003430000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756743295.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.1023629573.000001B4FAD4E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 5424, type: MEMORY |
Source: Yara match | File source: Process Memory Space: explorer.exe PID: 3424, type: MEMORY |
Source: Yara match | File source: Process Memory Space: regsvr32.exe PID: 5876, type: MEMORY |
Source: Yara match | File source: 00000017.00000003.823839422.000001F6E1200000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756834396.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.757094154.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.765016021.0000000005DAB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756986766.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.757116216.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756877993.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.757051571.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000020.00000002.1032085877.0000000004DDE000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000003.833217497.0000018E99E50000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.1022176574.000001DA4C29E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000003.846762687.000001E7A4180000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000020.00000003.843217682.0000000002B30000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000022.00000002.1023033064.0000027D4F83E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756945473.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.847443722.0000000000DDE000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.825598679.0000000003470000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.848064727.000001E7A436E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.845341823.0000000003430000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000003.756743295.0000000005F28000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.1023629573.000001B4FAD4E000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 5424, type: MEMORY |
Source: Yara match | File source: Process Memory Space: explorer.exe PID: 3424, type: MEMORY |
Source: Yara match | File source: Process Memory Space: regsvr32.exe PID: 5876, type: MEMORY |
Source: 00000017.00000003.823839422.000001F6E1200000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000020.00000002.1032085877.0000000004DDE000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000021.00000003.833217497.0000018E99E50000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000025.00000002.1022176574.000001DA4C29E000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000023.00000003.846762687.000001E7A4180000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000020.00000003.843217682.0000000002B30000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000022.00000002.1023033064.0000027D4F83E000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000021.00000002.847443722.0000000000DDE000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000023.00000002.848064727.000001E7A436E000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: 00000024.00000002.1023629573.000001B4FAD4E000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Win32.Gozi Author: CCN-CERT |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::CreateKey |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetBinaryValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\SysWOW64\regsvr32.exe | Code function: 2_2_033F4F73 GetProcAddress,NtCreateSection,memset, | 2_2_033F4F73 |
Source: C:\Windows\SysWOW64\regsvr32.exe | Code function: 2_2_033F11A9 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, | 2_2_033F11A9 |
Source: C:\Windows\SysWOW64\regsvr32.exe | Code function: 2_2_033F34D0 NtMapViewOfSection, | 2_2_033F34D0 |
Source: C:\Windows\SysWOW64\regsvr32.exe | Code function: 2_2_033FB159 NtQueryVirtualMemory, | 2_2_033FB159 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DAC458 RtlAllocateHeap,NtSetContextThread,NtUnmapViewOfSection,NtClose, | 32_2_04DAC458 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA1C74 NtQuerySystemInformation, | 32_2_04DA1C74 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC9584 NtReadVirtualMemory, | 32_2_04DC9584 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA7D44 NtQueryInformationProcess, | 32_2_04DA7D44 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC1EEC NtCreateSection, | 32_2_04DC1EEC |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DAF640 NtQueryInformationToken,NtQueryInformationToken,NtClose,NtClose, | 32_2_04DAF640 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DBEF14 NtMapViewOfSection, | 32_2_04DBEF14 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCF9A4 NtAllocateVirtualMemory, | 32_2_04DCF9A4 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCC130 NtWriteVirtualMemory, | 32_2_04DCC130 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB1A9C RtlAllocateHeap,NtQueryInformationProcess, | 32_2_04DB1A9C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB2BD8 NtSetInformationProcess,CreateRemoteThread,ResumeThread, | 32_2_04DB2BD8 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC9B4C NtQueryInformationProcess, | 32_2_04DC9B4C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DE1002 NtProtectVirtualMemory,NtProtectVirtualMemory, | 32_2_04DE1002 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCF9A4 NtAllocateVirtualMemory, | 33_2_00DCF9A4 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCC130 NtWriteVirtualMemory, | 33_2_00DCC130 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB1A9C NtQueryInformationProcess, | 33_2_00DB1A9C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB2BD8 NtSetInformationProcess,CreateRemoteThread,ResumeThread,FindCloseChangeNotification, | 33_2_00DB2BD8 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC9B4C NtQueryInformationProcess, | 33_2_00DC9B4C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DAC458 RtlAllocateHeap,NtSetContextThread,NtUnmapViewOfSection,NtClose, | 33_2_00DAC458 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC9584 NtReadVirtualMemory, | 33_2_00DC9584 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC1EEC NtCreateSection, | 33_2_00DC1EEC |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DAF640 NtQueryInformationToken,NtQueryInformationToken,NtClose, | 33_2_00DAF640 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DBEF14 NtMapViewOfSection, | 33_2_00DBEF14 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DE1002 NtProtectVirtualMemory,NtProtectVirtualMemory, | 33_2_00DE1002 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4359B4C NtQueryInformationProcess, | 35_2_000001E7A4359B4C |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A433F640 NtQueryInformationToken,NtQueryInformationToken,NtClose, | 35_2_000001E7A433F640 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4371002 NtProtectVirtualMemory,NtProtectVirtualMemory, | 35_2_000001E7A4371002 |
Source: C:\Windows\SysWOW64\regsvr32.exe | Code function: 2_2_033FAF34 | 2_2_033FAF34 |
Source: C:\Windows\SysWOW64\regsvr32.exe | Code function: 2_2_033F28E9 | 2_2_033F28E9 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA74A8 | 32_2_04DA74A8 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DAC458 | 32_2_04DAC458 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC9C04 | 32_2_04DC9C04 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB3438 | 32_2_04DB3438 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB7500 | 32_2_04DB7500 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA3F98 | 32_2_04DA3F98 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB5890 | 32_2_04DB5890 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB2854 | 32_2_04DB2854 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA42CC | 32_2_04DA42CC |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DBAACC | 32_2_04DBAACC |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DAEBD0 | 32_2_04DAEBD0 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB6B80 | 32_2_04DB6B80 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB44FC | 32_2_04DB44FC |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DADC88 | 32_2_04DADC88 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC1C68 | 32_2_04DC1C68 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCD468 | 32_2_04DCD468 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC7DDC | 32_2_04DC7DDC |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA559C | 32_2_04DA559C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC75B4 | 32_2_04DC75B4 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC15A0 | 32_2_04DC15A0 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC0D40 | 32_2_04DC0D40 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCED7C | 32_2_04DCED7C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA9514 | 32_2_04DA9514 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB1D14 | 32_2_04DB1D14 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA1D20 | 32_2_04DA1D20 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DBBE9C | 32_2_04DBBE9C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCEFD0 | 32_2_04DCEFD0 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB97C8 | 32_2_04DB97C8 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB4F5C | 32_2_04DB4F5C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DBEF7C | 32_2_04DBEF7C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB2F1C | 32_2_04DB2F1C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA78F0 | 32_2_04DA78F0 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCE09C | 32_2_04DCE09C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB386C | 32_2_04DB386C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB206C | 32_2_04DB206C |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DBE808 | 32_2_04DBE808 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCE038 | 32_2_04DCE038 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB11DC | 32_2_04DB11DC |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA49BC | 32_2_04DA49BC |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC0294 | 32_2_04DC0294 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DCFA10 | 32_2_04DCFA10 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC6A28 | 32_2_04DC6A28 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC2BD8 | 32_2_04DC2BD8 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DC53D4 | 32_2_04DC53D4 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB3BF4 | 32_2_04DB3BF4 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DA2B40 | 32_2_04DA2B40 |
Source: C:\Windows\explorer.exe | Code function: 32_2_04DB0304 | 32_2_04DB0304 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB5890 | 33_2_00DB5890 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB6B80 | 33_2_00DB6B80 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DAC458 | 33_2_00DAC458 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA78F0 | 33_2_00DA78F0 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCE09C | 33_2_00DCE09C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB2854 | 33_2_00DB2854 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB386C | 33_2_00DB386C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB206C | 33_2_00DB206C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DBE808 | 33_2_00DBE808 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCE038 | 33_2_00DCE038 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB11DC | 33_2_00DB11DC |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA49BC | 33_2_00DA49BC |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA42CC | 33_2_00DA42CC |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DBAACC | 33_2_00DBAACC |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC0294 | 33_2_00DC0294 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCFA10 | 33_2_00DCFA10 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC6A28 | 33_2_00DC6A28 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC2BD8 | 33_2_00DC2BD8 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC53D4 | 33_2_00DC53D4 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DAEBD0 | 33_2_00DAEBD0 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB3BF4 | 33_2_00DB3BF4 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA2B40 | 33_2_00DA2B40 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB0304 | 33_2_00DB0304 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB44FC | 33_2_00DB44FC |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DADC88 | 33_2_00DADC88 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA74A8 | 33_2_00DA74A8 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC1C68 | 33_2_00DC1C68 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCD468 | 33_2_00DCD468 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC9C04 | 33_2_00DC9C04 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB3438 | 33_2_00DB3438 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC7DDC | 33_2_00DC7DDC |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA559C | 33_2_00DA559C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC75B4 | 33_2_00DC75B4 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC15A0 | 33_2_00DC15A0 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DC0D40 | 33_2_00DC0D40 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCED7C | 33_2_00DCED7C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA9514 | 33_2_00DA9514 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB1D14 | 33_2_00DB1D14 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB7500 | 33_2_00DB7500 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA1D20 | 33_2_00DA1D20 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DBBE9C | 33_2_00DBBE9C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DCEFD0 | 33_2_00DCEFD0 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB97C8 | 33_2_00DB97C8 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DA3F98 | 33_2_00DA3F98 |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB4F5C | 33_2_00DB4F5C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DBEF7C | 33_2_00DBEF7C |
Source: C:\Windows\System32\control.exe | Code function: 33_2_00DB2F1C | 33_2_00DB2F1C |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4346B80 | 35_2_000001E7A4346B80 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4345890 | 35_2_000001E7A4345890 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43349BC | 35_2_000001E7A43349BC |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43411DC | 35_2_000001E7A43411DC |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4356A28 | 35_2_000001E7A4356A28 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A435FA10 | 35_2_000001E7A435FA10 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4350294 | 35_2_000001E7A4350294 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4340304 | 35_2_000001E7A4340304 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A434AACC | 35_2_000001E7A434AACC |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43342CC | 35_2_000001E7A43342CC |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4332B40 | 35_2_000001E7A4332B40 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4359C04 | 35_2_000001E7A4359C04 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4343BF4 | 35_2_000001E7A4343BF4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4352BD8 | 35_2_000001E7A4352BD8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43553D4 | 35_2_000001E7A43553D4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A433EBD0 | 35_2_000001E7A433EBD0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4343438 | 35_2_000001E7A4343438 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4351C68 | 35_2_000001E7A4351C68 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A435D468 | 35_2_000001E7A435D468 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A433C458 | 35_2_000001E7A433C458 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43374A8 | 35_2_000001E7A43374A8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A433DC88 | 35_2_000001E7A433DC88 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43444FC | 35_2_000001E7A43444FC |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4347500 | 35_2_000001E7A4347500 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4350D40 | 35_2_000001E7A4350D40 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4331D20 | 35_2_000001E7A4331D20 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4341D14 | 35_2_000001E7A4341D14 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4339514 | 35_2_000001E7A4339514 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A435ED7C | 35_2_000001E7A435ED7C |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43575B4 | 35_2_000001E7A43575B4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A433559C | 35_2_000001E7A433559C |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A43515A0 | 35_2_000001E7A43515A0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 35_2_000001E7A4357DDC | |