Source: |
Binary string: c:\938\follow-Record\Suffix\observe-element\force.pdb source: loaddll32.exe, 00000000.00000002.502911905.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000002.507263377.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.511820988.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.537390503.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000002.534924551.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000016.00000002.535615394.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 0000001B.00000002.513340429.000000006E26A000.00000002.00020000.sdmp, jrC504LJVe.dll |
Source: Yara match |
File source: jrC504LJVe.dll, type: SAMPLE |
Source: Yara match |
File source: 00000002.00000002.507194877.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.529754214.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.501190054.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001B.00000002.513290873.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.507194291.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000E.00000002.537272561.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000011.00000002.525353874.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 2.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 14.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 27.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll32.exe.6e1e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 17.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: jrC504LJVe.dll, type: SAMPLE |
Source: Yara match |
File source: 00000002.00000002.507194877.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.529754214.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.501190054.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001B.00000002.513290873.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.507194291.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000E.00000002.537272561.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000011.00000002.525353874.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 2.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 14.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 27.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll32.exe.6e1e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 17.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E223E00 |
0_2_6E223E00 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E221C3C |
0_2_6E221C3C |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E2567D9 |
0_2_6E2567D9 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E2484BB |
0_2_6E2484BB |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E2602BC |
0_2_6E2602BC |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E250396 |
0_2_6E250396 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E23E079 |
0_2_6E23E079 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E235150 |
0_2_6E235150 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E223E00 |
2_2_6E223E00 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E2567D9 |
2_2_6E2567D9 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E221C3C |
2_2_6E221C3C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E2484BB |
2_2_6E2484BB |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E2602BC |
2_2_6E2602BC |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E250396 |
2_2_6E250396 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E23E079 |
2_2_6E23E079 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E235150 |
2_2_6E235150 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: String function: 6E220990 appears 34 times |
|
Source: C:\Windows\System32\loaddll32.exe |
Code function: String function: 6E2200AC appears 100 times |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: String function: 6E220990 appears 34 times |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: String function: 6E2200AC appears 100 times |
|
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4808:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6944:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5668:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6724:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6388:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6504:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6236:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3412:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1304:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5808:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6440:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5516:120:WilError_01 |
Source: unknown |
Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\jrC504LJVe.dll' |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\jrC504LJVe.dll',#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,Connectdark |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\jrC504LJVe.dll',#1 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,Mindlake |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
|
Source: C:\Windows\System32\conhost.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,Porthigh |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\conhost.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,Problemscale |
|
Source: C:\Windows\System32\conhost.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,WingGrass |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\jrC504LJVe.dll',#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,Connectdark |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,Mindlake |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,Problemscale |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\jrC504LJVe.dll,WingGrass |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\jrC504LJVe.dll',#1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: |
Binary string: c:\938\follow-Record\Suffix\observe-element\force.pdb source: loaddll32.exe, 00000000.00000002.502911905.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000002.507263377.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.511820988.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.537390503.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000002.534924551.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 00000016.00000002.535615394.000000006E26A000.00000002.00020000.sdmp, rundll32.exe, 0000001B.00000002.513340429.000000006E26A000.00000002.00020000.sdmp, jrC504LJVe.dll |
Source: Yara match |
File source: jrC504LJVe.dll, type: SAMPLE |
Source: Yara match |
File source: 00000002.00000002.507194877.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.529754214.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.501190054.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001B.00000002.513290873.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.507194291.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000E.00000002.537272561.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000011.00000002.525353874.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 2.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 14.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 27.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll32.exe.6e1e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 17.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe |
Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E241F6D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_6E241F6D |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E2207A7 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_6E2207A7 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6E220288 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_6E220288 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E241F6D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
2_2_6E241F6D |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E2207A7 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
2_2_6E2207A7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 2_2_6E220288 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
2_2_6E220288 |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\jrC504LJVe.dll',#1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m |
Jump to behavior |
Source: loaddll32.exe, 00000000.00000002.501134012.00000000013C0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.483282253.00000000033D0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.481774524.0000000003530000.00000002.00000001.sdmp, rundll32.exe, 0000000E.00000002.537147837.0000000003820000.00000002.00000001.sdmp, rundll32.exe, 00000011.00000002.514327725.0000000003870000.00000002.00000001.sdmp, rundll32.exe, 00000016.00000002.520658542.0000000002CE0000.00000002.00000001.sdmp, rundll32.exe, 0000001B.00000002.513252331.0000000002D40000.00000002.00000001.sdmp |
Binary or memory string: Program Manager |
Source: loaddll32.exe, 00000000.00000002.501134012.00000000013C0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.483282253.00000000033D0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.481774524.0000000003530000.00000002.00000001.sdmp, rundll32.exe, 0000000E.00000002.537147837.0000000003820000.00000002.00000001.sdmp, rundll32.exe, 00000011.00000002.514327725.0000000003870000.00000002.00000001.sdmp, rundll32.exe, 00000016.00000002.520658542.0000000002CE0000.00000002.00000001.sdmp, rundll32.exe, 0000001B.00000002.513252331.0000000002D40000.00000002.00000001.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: loaddll32.exe, 00000000.00000002.501134012.00000000013C0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.483282253.00000000033D0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.481774524.0000000003530000.00000002.00000001.sdmp, rundll32.exe, 0000000E.00000002.537147837.0000000003820000.00000002.00000001.sdmp, rundll32.exe, 00000011.00000002.514327725.0000000003870000.00000002.00000001.sdmp, rundll32.exe, 00000016.00000002.520658542.0000000002CE0000.00000002.00000001.sdmp, rundll32.exe, 0000001B.00000002.513252331.0000000002D40000.00000002.00000001.sdmp |
Binary or memory string: Progman |
Source: loaddll32.exe, 00000000.00000002.501134012.00000000013C0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.483282253.00000000033D0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.481774524.0000000003530000.00000002.00000001.sdmp, rundll32.exe, 0000000E.00000002.537147837.0000000003820000.00000002.00000001.sdmp, rundll32.exe, 00000011.00000002.514327725.0000000003870000.00000002.00000001.sdmp, rundll32.exe, 00000016.00000002.520658542.0000000002CE0000.00000002.00000001.sdmp, rundll32.exe, 0000001B.00000002.513252331.0000000002D40000.00000002.00000001.sdmp |
Binary or memory string: Progmanlock |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW, |
0_2_6E25DF65 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
0_2_6E25DD96 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: EnumSystemLocalesW, |
0_2_6E253952 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW, |
0_2_6E25E61F |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
0_2_6E25E6EC |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
0_2_6E25E518 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW, |
0_2_6E254323 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: ___crtGetLocaleInfoEx, |
0_2_6E21F364 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW, |
0_2_6E25E3EF |
Source: C:\Windows\System32\loaddll32.exe |
Code function: EnumSystemLocalesW, |
0_2_6E25E00E |
Source: C:\Windows\System32\loaddll32.exe |
Code function: EnumSystemLocalesW, |
0_2_6E25E077 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: EnumSystemLocalesW, |
0_2_6E25E112 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW, |
0_2_6E21F1B7 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
0_2_6E25E19F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW, |
2_2_6E25E61F |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
2_2_6E25E6EC |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW, |
2_2_6E25DF65 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
2_2_6E25E518 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
2_2_6E25DD96 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW, |
2_2_6E254323 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: ___crtGetLocaleInfoEx, |
2_2_6E21F364 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW, |
2_2_6E25E3EF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: EnumSystemLocalesW, |
2_2_6E25E00E |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: EnumSystemLocalesW, |
2_2_6E25E077 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: EnumSystemLocalesW, |
2_2_6E25E112 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: EnumSystemLocalesW, |
2_2_6E253952 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW, |
2_2_6E21F1B7 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
2_2_6E25E19F |
Source: Yara match |
File source: jrC504LJVe.dll, type: SAMPLE |
Source: Yara match |
File source: 00000002.00000002.507194877.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.529754214.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.501190054.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001B.00000002.513290873.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.507194291.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000E.00000002.537272561.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000011.00000002.525353874.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 2.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 14.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 27.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll32.exe.6e1e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 17.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: jrC504LJVe.dll, type: SAMPLE |
Source: Yara match |
File source: 00000002.00000002.507194877.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000016.00000002.529754214.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.501190054.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001B.00000002.513290873.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.507194291.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000E.00000002.537272561.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000011.00000002.525353874.000000006E1E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 2.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 14.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 27.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 22.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll32.exe.6e1e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 17.2.rundll32.exe.6e1e0000.1.unpack, type: UNPACKEDPE |