Source: Yara match |
File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: Yara match |
File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D471EC7 NtMapViewOfSection, |
0_2_6D471EC7 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D471B9C GetProcAddress,NtCreateSection,memset, |
0_2_6D471B9C |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D472485 NtQueryVirtualMemory, |
0_2_6D472485 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_00DE2D06 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
0_2_00DE2D06 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_00DE8005 NtQueryVirtualMemory, |
0_2_00DE8005 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_00792D06 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
3_2_00792D06 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_00798005 NtQueryVirtualMemory, |
3_2_00798005 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D472264 |
0_2_6D472264 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_00DE2206 |
0_2_00DE2206 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_00DE7DE0 |
0_2_00DE7DE0 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_00DE3109 |
0_2_00DE3109 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D48DCB0 |
0_2_6D48DCB0 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D48C9A5 |
0_2_6D48C9A5 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D48387C |
0_2_6D48387C |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D48B024 |
0_2_6D48B024 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D47FE5A |
0_2_6D47FE5A |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_00792206 |
3_2_00792206 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_00793109 |
3_2_00793109 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_00797DE0 |
3_2_00797DE0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D48DCB0 |
3_2_6D48DCB0 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D48C9A5 |
3_2_6D48C9A5 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D48387C |
3_2_6D48387C |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D48B024 |
3_2_6D48B024 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D47FE5A |
3_2_6D47FE5A |
Source: unknown |
Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\mental.dll' |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Behind |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Factpresent |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Steadunder |
|
Source: unknown |
Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding |
|
Source: C:\Program Files\internet explorer\iexplore.exe |
Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17410 /prefetch:2 |
|
Source: C:\Program Files\internet explorer\iexplore.exe |
Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17420 /prefetch:2 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Behind |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Factpresent |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Steadunder |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe |
Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17410 /prefetch:2 |
Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe |
Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17420 /prefetch:2 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D472253 push ecx; ret |
0_2_6D472263 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D472200 push ecx; ret |
0_2_6D472209 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_00DE7A60 push ecx; ret |
0_2_00DE7A69 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_00DE7DCF push ecx; ret |
0_2_00DE7DDF |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D48FC77 push ecx; ret |
0_2_6D48FC78 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D490CBF push ss; ret |
0_2_6D490CE4 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D47F7C5 push ecx; ret |
0_2_6D47F7D8 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D493AAC push ecx; retf |
0_2_6D493AB1 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: 0_2_6D4CBA1A push A00002CFh; iretd |
0_2_6D4CBA21 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_00797A60 push ecx; ret |
3_2_00797A69 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_00797DCF push ecx; ret |
3_2_00797DDF |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D4941C6 pushad ; iretd |
3_2_6D4941CB |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D48FC77 push ecx; ret |
3_2_6D48FC78 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D490CBF push ss; ret |
3_2_6D490CE4 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D493F7D pushad ; ret |
3_2_6D493FC9 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D47F7C5 push ecx; ret |
3_2_6D47F7D8 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D493AAC push ecx; retf |
3_2_6D493AB1 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: 3_2_6D4CBA1A push A00002CFh; iretd |
3_2_6D4CBA21 |
Source: Yara match |
File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: C:\Windows\System32\loaddll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA, |
0_2_6D471E8A |
Source: C:\Windows\System32\loaddll32.exe |
Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, |
0_2_6D489540 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,___crtGetLocaleInfoA,__invoke_watson, |
0_2_6D47F974 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: _GetPrimaryLen,EnumSystemLocalesW, |
0_2_6D489121 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW,_GetPrimaryLen, |
0_2_6D4895ED |
Source: C:\Windows\System32\loaddll32.exe |
Code function: _GetPrimaryLen,EnumSystemLocalesW, |
0_2_6D48919E |
Source: C:\Windows\System32\loaddll32.exe |
Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, |
0_2_6D487594 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: GetLocaleInfoW, |
0_2_6D47E05B |
Source: C:\Windows\System32\loaddll32.exe |
Code function: __crtGetLocaleInfoA_stat, |
0_2_6D48806A |
Source: C:\Windows\System32\loaddll32.exe |
Code function: EnumSystemLocalesW, |
0_2_6D47E01E |
Source: C:\Windows\System32\loaddll32.exe |
Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, |
0_2_6D489416 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: EnumSystemLocalesW, |
0_2_6D4890E1 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num, |
0_2_6D486F92 |
Source: C:\Windows\System32\loaddll32.exe |
Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW, |
0_2_6D488E6D |
Source: C:\Windows\System32\loaddll32.exe |
Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, |
0_2_6D489221 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, |
3_2_6D489540 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,___crtGetLocaleInfoA,__invoke_watson, |
3_2_6D47F974 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _GetPrimaryLen,EnumSystemLocalesW, |
3_2_6D489121 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW,_GetPrimaryLen, |
3_2_6D4895ED |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _GetPrimaryLen,EnumSystemLocalesW, |
3_2_6D48919E |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, |
3_2_6D487594 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: GetLocaleInfoW, |
3_2_6D47E05B |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: __crtGetLocaleInfoA_stat, |
3_2_6D48806A |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: EnumSystemLocalesW, |
3_2_6D47E01E |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, |
3_2_6D489416 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: EnumSystemLocalesW, |
3_2_6D4890E1 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num, |
3_2_6D486F92 |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW, |
3_2_6D488E6D |
Source: C:\Windows\SysWOW64\rundll32.exe |
Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, |
3_2_6D489221 |
Source: Yara match |
File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: Yara match |
File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |