Source: Yara match | File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D471EC7 NtMapViewOfSection, |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D471B9C GetProcAddress,NtCreateSection,memset, |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D472485 NtQueryVirtualMemory, |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00DE2D06 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00DE8005 NtQueryVirtualMemory, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_00792D06 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_00798005 NtQueryVirtualMemory, |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D472264 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00DE2206 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00DE7DE0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00DE3109 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D48DCB0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D48C9A5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D48387C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D48B024 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D47FE5A |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_00792206 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_00793109 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_00797DE0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D48DCB0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D48C9A5 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D48387C |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D48B024 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D47FE5A |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\mental.dll' |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Behind |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Factpresent |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Steadunder |
Source: unknown | Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17410 /prefetch:2 |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17420 /prefetch:2 |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Behind |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Factpresent |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mental.dll,Steadunder |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\mental.dll',#1 |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17410 /prefetch:2 |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5608 CREDAT:17420 /prefetch:2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D472253 push ecx; ret |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D472200 push ecx; ret |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00DE7A60 push ecx; ret |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00DE7DCF push ecx; ret |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D48FC77 push ecx; ret |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D490CBF push ss; ret |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D47F7C5 push ecx; ret |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D493AAC push ecx; retf |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6D4CBA1A push A00002CFh; iretd |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_00797A60 push ecx; ret |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_00797DCF push ecx; ret |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D4941C6 pushad ; iretd |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D48FC77 push ecx; ret |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D490CBF push ss; ret |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D493F7D pushad ; ret |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D47F7C5 push ecx; ret |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D493AAC push ecx; retf |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_6D4CBA1A push A00002CFh; iretd |
Source: Yara match | File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\loaddll32.exe | Code function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA, |
Source: C:\Windows\System32\loaddll32.exe | Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, |
Source: C:\Windows\System32\loaddll32.exe | Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,___crtGetLocaleInfoA,__invoke_watson, |
Source: C:\Windows\System32\loaddll32.exe | Code function: _GetPrimaryLen,EnumSystemLocalesW, |
Source: C:\Windows\System32\loaddll32.exe | Code function: GetLocaleInfoW,_GetPrimaryLen, |
Source: C:\Windows\System32\loaddll32.exe | Code function: _GetPrimaryLen,EnumSystemLocalesW, |
Source: C:\Windows\System32\loaddll32.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, |
Source: C:\Windows\System32\loaddll32.exe | Code function: GetLocaleInfoW, |
Source: C:\Windows\System32\loaddll32.exe | Code function: __crtGetLocaleInfoA_stat, |
Source: C:\Windows\System32\loaddll32.exe | Code function: EnumSystemLocalesW, |
Source: C:\Windows\System32\loaddll32.exe | Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, |
Source: C:\Windows\System32\loaddll32.exe | Code function: EnumSystemLocalesW, |
Source: C:\Windows\System32\loaddll32.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num, |
Source: C:\Windows\System32\loaddll32.exe | Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW, |
Source: C:\Windows\System32\loaddll32.exe | Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,___crtGetLocaleInfoA,__invoke_watson, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _GetPrimaryLen,EnumSystemLocalesW, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: GetLocaleInfoW,_GetPrimaryLen, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _GetPrimaryLen,EnumSystemLocalesW, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: GetLocaleInfoW, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: __crtGetLocaleInfoA_stat, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: EnumSystemLocalesW, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: EnumSystemLocalesW, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW, |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, |
Source: Yara match | File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000003.894024804.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894006567.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.894036299.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858380580.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858493961.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.925438846.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893911104.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893958439.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858602685.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858556678.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893875579.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858220595.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.924921046.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858579008.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858117816.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.858445363.0000000005018000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893935823.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.893978637.0000000003D18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6644, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6608, type: MEMORYSTR |