Source: 12.2.rundll32.exe.a00000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 13.0.rundll32.exe.af4756.4.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 12.0.rundll32.exe.b94756.4.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 11.0.rundll32.exe.b10000.3.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 2.0.rundll32.exe.3494756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 8.2.rundll32.exe.ba0000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 10.2.rundll32.exe.c30000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 0.0.loaddll32.exe.29b4756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 12.0.rundll32.exe.b94756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 13.2.rundll32.exe.af4756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 2.0.rundll32.exe.31d0000.3.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 10.0.rundll32.exe.c30000.3.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 0.0.loaddll32.exe.b50000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 10.0.rundll32.exe.c30000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 10.0.rundll32.exe.4834756.4.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 2.0.rundll32.exe.3494756.4.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 13.0.rundll32.exe.5f0000.3.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 13.0.rundll32.exe.af4756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 3.2.rundll32.exe.d54756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 10.2.rundll32.exe.4834756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 12.0.rundll32.exe.a00000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 13.0.rundll32.exe.5f0000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 8.2.rundll32.exe.4a34756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 11.2.rundll32.exe.b10000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 11.0.rundll32.exe.b10000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 12.2.rundll32.exe.b94756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 10.0.rundll32.exe.4834756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 11.0.rundll32.exe.46a4756.4.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 2.0.rundll32.exe.31d0000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 11.0.rundll32.exe.46a4756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 11.2.rundll32.exe.46a4756.1.unpack |
Avira: Label: TR/Patched.Ren.Gen |
Source: 12.0.rundll32.exe.a00000.3.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 13.2.rundll32.exe.5f0000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: 3.2.rundll32.exe.7b0000.0.unpack |
Avira: Label: TR/ATRAPS.Gen2 |
Source: Yara match |
File source: 12.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 12.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 13.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 11.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 11.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 13.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 8.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 11.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 13.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 12.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000B.00000002.1035624541.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000D.00000000.987956861.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000C.00000000.994333944.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.1035258572.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000000.993496871.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000C.00000000.984331787.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000B.00000000.984417816.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000C.00000002.1038712080.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000000.983061292.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000008.00000002.1189742876.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000000.781525113.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000D.00000000.1005884089.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000D.00000002.1038939767.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000B.00000000.993970485.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.1190711259.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY |
Source: unknown |
Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll' |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668 |
|
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
|
Source: Amcache.hve.19.dr |
Binary or memory string: VMware |
Source: Amcache.hve.19.dr |
Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000 |
Source: Amcache.hve.19.dr |
Binary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000 |
Source: Amcache.hve.19.dr |
Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.19.dr |
Binary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed |
Source: Amcache.hve.19.dr |
Binary or memory string: VMware, Inc. |
Source: Amcache.hve.19.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Devicehbin |
Source: Amcache.hve.19.dr |
Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.19.dr |
Binary or memory string: VMware7,1 |
Source: Amcache.hve.19.dr |
Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.19.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.19.dr |
Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.19.dr |
Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.19.dr |
Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.19.dr |
Binary or memory string: VMware, Inc.me |
Source: Amcache.hve.19.dr |
Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000 |
Source: Amcache.hve.19.dr |
Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000 |
Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmp |
Binary or memory string: Program Manager |
Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmp |
Binary or memory string: Progman |
Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmp |
Binary or memory string: Progmanlock |