Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014005284C |
0_2_000000014005284C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140048A4C |
0_2_0000000140048A4C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140040370 |
0_2_0000000140040370 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400343E8 |
0_2_00000001400343E8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140026C74 |
0_2_0000000140026C74 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004F4D0 |
0_2_000000014004F4D0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140049CE8 |
0_2_0000000140049CE8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004357C |
0_2_000000014004357C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014003DEEC |
0_2_000000014003DEEC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140036778 |
0_2_0000000140036778 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140022004 |
0_2_0000000140022004 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140060014 |
0_2_0000000140060014 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140024028 |
0_2_0000000140024028 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002782C |
0_2_000000014002782C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002E030 |
0_2_000000014002E030 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014005582B |
0_2_000000014005582B |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140034044 |
0_2_0000000140034044 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014000F848 |
0_2_000000014000F848 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014003D878 |
0_2_000000014003D878 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140020094 |
0_2_0000000140020094 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002F8A4 |
0_2_000000014002F8A4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400280AC |
0_2_00000001400280AC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004F0AC |
0_2_000000014004F0AC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400410B4 |
0_2_00000001400410B4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400150E4 |
0_2_00000001400150E4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140066100 |
0_2_0000000140066100 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140025100 |
0_2_0000000140025100 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004D914 |
0_2_000000014004D914 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140033124 |
0_2_0000000140033124 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140032128 |
0_2_0000000140032128 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140025930 |
0_2_0000000140025930 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140005950 |
0_2_0000000140005950 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004E954 |
0_2_000000014004E954 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140001158 |
0_2_0000000140001158 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014003796C |
0_2_000000014003796C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140049980 |
0_2_0000000140049980 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140039990 |
0_2_0000000140039990 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002F198 |
0_2_000000014002F198 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400389A4 |
0_2_00000001400389A4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400099AC |
0_2_00000001400099AC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400659F0 |
0_2_00000001400659F0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002EA1C |
0_2_000000014002EA1C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140055A4D |
0_2_0000000140055A4D |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014005A24C |
0_2_000000014005A24C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014001B250 |
0_2_000000014001B250 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140001A78 |
0_2_0000000140001A78 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140007284 |
0_2_0000000140007284 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140061283 |
0_2_0000000140061283 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140061A90 |
0_2_0000000140061A90 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400642A0 |
0_2_00000001400642A0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002DAA4 |
0_2_000000014002DAA4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140043AC0 |
0_2_0000000140043AC0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140019AC4 |
0_2_0000000140019AC4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400512E0 |
0_2_00000001400512E0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400162E0 |
0_2_00000001400162E0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002BAEC |
0_2_000000014002BAEC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140006AEC |
0_2_0000000140006AEC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140063324 |
0_2_0000000140063324 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140013B64 |
0_2_0000000140013B64 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140055364 |
0_2_0000000140055364 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140019378 |
0_2_0000000140019378 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140060B8C |
0_2_0000000140060B8C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014001A394 |
0_2_000000014001A394 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140008B94 |
0_2_0000000140008B94 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004BBBC |
0_2_000000014004BBBC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140021BD8 |
0_2_0000000140021BD8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400243E0 |
0_2_00000001400243E0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002B3F3 |
0_2_000000014002B3F3 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140004C0C |
0_2_0000000140004C0C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002B429 |
0_2_000000014002B429 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140012474 |
0_2_0000000140012474 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014000AC74 |
0_2_000000014000AC74 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140038478 |
0_2_0000000140038478 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004FC74 |
0_2_000000014004FC74 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002747C |
0_2_000000014002747C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002A4A4 |
0_2_000000014002A4A4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014001B4AC |
0_2_000000014001B4AC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004A4B0 |
0_2_000000014004A4B0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140063CB4 |
0_2_0000000140063CB4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002F4B8 |
0_2_000000014002F4B8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140003CC4 |
0_2_0000000140003CC4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014000ECD0 |
0_2_000000014000ECD0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140017CD4 |
0_2_0000000140017CD4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140044CD8 |
0_2_0000000140044CD8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004ECF8 |
0_2_000000014004ECF8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140042504 |
0_2_0000000140042504 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140026534 |
0_2_0000000140026534 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002AD38 |
0_2_000000014002AD38 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140022D50 |
0_2_0000000140022D50 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140029550 |
0_2_0000000140029550 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140012D8C |
0_2_0000000140012D8C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140051D90 |
0_2_0000000140051D90 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140006D94 |
0_2_0000000140006D94 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400515A0 |
0_2_00000001400515A0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400285AC |
0_2_00000001400285AC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140031DCC |
0_2_0000000140031DCC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400365D0 |
0_2_00000001400365D0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400205D8 |
0_2_00000001400205D8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140011DE4 |
0_2_0000000140011DE4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004D5EC |
0_2_000000014004D5EC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014003A60C |
0_2_000000014003A60C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140021E1C |
0_2_0000000140021E1C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140023E1C |
0_2_0000000140023E1C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004E628 |
0_2_000000014004E628 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004CE2C |
0_2_000000014004CE2C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140018638 |
0_2_0000000140018638 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140004E38 |
0_2_0000000140004E38 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140014644 |
0_2_0000000140014644 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002EE48 |
0_2_000000014002EE48 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004A660 |
0_2_000000014004A660 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140053670 |
0_2_0000000140053670 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014003AE70 |
0_2_000000014003AE70 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140031670 |
0_2_0000000140031670 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014002D694 |
0_2_000000014002D694 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140036E98 |
0_2_0000000140036E98 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014000D69C |
0_2_000000014000D69C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140050EA8 |
0_2_0000000140050EA8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140053EC0 |
0_2_0000000140053EC0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014001BEC8 |
0_2_000000014001BEC8 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400466C4 |
0_2_00000001400466C4 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014004EF0C |
0_2_000000014004EF0C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140017F40 |
0_2_0000000140017F40 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014001CF40 |
0_2_000000014001CF40 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140041F3C |
0_2_0000000140041F3C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140032750 |
0_2_0000000140032750 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014000578C |
0_2_000000014000578C |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400137A0 |
0_2_00000001400137A0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400557A3 |
0_2_00000001400557A3 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000000014001C7CC |
0_2_000000014001C7CC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00000001400027DC |
0_2_00000001400027DC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_0000000140030FE0 |
0_2_0000000140030FE0 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF744385364 |
23_2_00007FF744385364 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF74438D570 |
23_2_00007FF74438D570 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF744386920 |
23_2_00007FF744386920 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF7443891DC |
23_2_00007FF7443891DC |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF744385998 |
23_2_00007FF744385998 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF74438B9B4 |
23_2_00007FF74438B9B4 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF7443883BC |
23_2_00007FF7443883BC |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF7443897D4 |
23_2_00007FF7443897D4 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF744388058 |
23_2_00007FF744388058 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF74438A094 |
23_2_00007FF74438A094 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF74438D220 |
23_2_00007FF74438D220 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF74438CE28 |
23_2_00007FF74438CE28 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF7443884DC |
23_2_00007FF7443884DC |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF744385EE0 |
23_2_00007FF744385EE0 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF7443812F8 |
23_2_00007FF7443812F8 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 23_2_00007FF74438730C |
23_2_00007FF74438730C |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF744385364 |
36_2_00007FF744385364 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF74438D570 |
36_2_00007FF74438D570 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF744386920 |
36_2_00007FF744386920 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF7443891DC |
36_2_00007FF7443891DC |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF744385998 |
36_2_00007FF744385998 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF74438B9B4 |
36_2_00007FF74438B9B4 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF7443883BC |
36_2_00007FF7443883BC |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF7443897D4 |
36_2_00007FF7443897D4 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF744388058 |
36_2_00007FF744388058 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF74438A094 |
36_2_00007FF74438A094 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF74438D220 |
36_2_00007FF74438D220 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF74438CE28 |
36_2_00007FF74438CE28 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF7443884DC |
36_2_00007FF7443884DC |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF744385EE0 |
36_2_00007FF744385EE0 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF7443812F8 |
36_2_00007FF7443812F8 |
Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe |
Code function: 36_2_00007FF74438730C |
36_2_00007FF74438730C |
Source: unknown |
Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\drytex.dll" |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1 |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\drytex.dll |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1 |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllCanUnloadNow |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllGetClassObject |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DwmAttachMilContent |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\phoneactivate.exe C:\Windows\system32\phoneactivate.exe |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\V8Ka.cmd |
|
Source: C:\Windows\System32\rundll32.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\pwcreator.exe C:\Windows\system32\pwcreator.exe |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\SppExtComObj.Exe C:\Windows\system32\SppExtComObj.Exe |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\33sSd.cmd |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E} |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /F /TN "Uttpj" /TR C:\Windows\system32\xs2t3d\SppExtComObj.Exe /SC minute /MO 60 /RL highest |
|
Source: C:\Windows\System32\schtasks.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\explorer.exe |
Process created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\drytex.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllCanUnloadNow |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllGetClassObject |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DwmAttachMilContent |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1 |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\phoneactivate.exe C:\Windows\system32\phoneactivate.exe |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\V8Ka.cmd |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\pwcreator.exe C:\Windows\system32\pwcreator.exe |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\SppExtComObj.Exe C:\Windows\system32\SppExtComObj.Exe |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\explorer.exe |
Process created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E} |
Jump to behavior |
Source: drytex.dll |
Static PE information: section name: .crt1 |
Source: drytex.dll |
Static PE information: section name: qwTG |
Source: drytex.dll |
Static PE information: section name: .lqen |
Source: drytex.dll |
Static PE information: section name: .vqb |
Source: drytex.dll |
Static PE information: section name: .gjd |
Source: drytex.dll |
Static PE information: section name: .wqhqlp |
Source: drytex.dll |
Static PE information: section name: .nulizw |
Source: drytex.dll |
Static PE information: section name: .fgrum |
Source: drytex.dll |
Static PE information: section name: .mjabqc |
Source: drytex.dll |
Static PE information: section name: .ghh |
Source: drytex.dll |
Static PE information: section name: .vrqcr |
Source: drytex.dll |
Static PE information: section name: .siorvl |
Source: drytex.dll |
Static PE information: section name: .sqgym |
Source: drytex.dll |
Static PE information: section name: .kqhrq |
Source: drytex.dll |
Static PE information: section name: .rsntf |
Source: drytex.dll |
Static PE information: section name: .iqt |
Source: drytex.dll |
Static PE information: section name: .kpwiuc |
Source: drytex.dll |
Static PE information: section name: .yuzcn |
Source: drytex.dll |
Static PE information: section name: .jbsbuw |
Source: drytex.dll |
Static PE information: section name: .mdjtj |
Source: drytex.dll |
Static PE information: section name: .mbjeh |
Source: drytex.dll |
Static PE information: section name: .amb |
Source: drytex.dll |
Static PE information: section name: .lac |
Source: drytex.dll |
Static PE information: section name: .zro |
Source: drytex.dll |
Static PE information: section name: .vtq |
Source: drytex.dll |
Static PE information: section name: .kyhoy |
Source: drytex.dll |
Static PE information: section name: .wvi |
Source: drytex.dll |
Static PE information: section name: .alzw |
Source: drytex.dll |
Static PE information: section name: .vdsoxe |
Source: drytex.dll |
Static PE information: section name: .pus |
Source: drytex.dll |
Static PE information: section name: .oqnl |
Source: drytex.dll |
Static PE information: section name: .ohjt |
Source: drytex.dll |
Static PE information: section name: .ofjxx |
Source: drytex.dll |
Static PE information: section name: .ifw |
Source: drytex.dll |
Static PE information: section name: .zktgse |
Source: drytex.dll |
Static PE information: section name: .pmd |
Source: drytex.dll |
Static PE information: section name: .kexxpw |
Source: drytex.dll |
Static PE information: section name: .kiqzd |
Source: drytex.dll |
Static PE information: section name: .uslf |
Source: drytex.dll |
Static PE information: section name: .zkkgx |
Source: drytex.dll |
Static PE information: section name: .phhwk |
Source: drytex.dll |
Static PE information: section name: .klf |
Source: drytex.dll |
Static PE information: section name: .xme |
Source: drytex.dll |
Static PE information: section name: .fnxmzz |
Source: drytex.dll |
Static PE information: section name: .wpkbi |
Source: drytex.dll |
Static PE information: section name: .gzgei |
Source: drytex.dll |
Static PE information: section name: .zep |
Source: drytex.dll |
Static PE information: section name: .viz |
Source: drytex.dll |
Static PE information: section name: .xqen |
Source: drytex.dll |
Static PE information: section name: .ouhvqw |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .crt1 |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: qwTG |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .lqen |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .vqb |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .gjd |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .wqhqlp |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .nulizw |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .fgrum |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .mjabqc |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .ghh |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .vrqcr |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .siorvl |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .sqgym |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .kqhrq |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .rsntf |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .iqt |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .kpwiuc |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .yuzcn |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .jbsbuw |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .mdjtj |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .mbjeh |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .amb |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .lac |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .zro |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .vtq |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .kyhoy |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .wvi |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .alzw |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .vdsoxe |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .pus |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .oqnl |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .ohjt |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .ofjxx |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .ifw |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .zktgse |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .pmd |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .kexxpw |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .kiqzd |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .uslf |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .zkkgx |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .phhwk |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .klf |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .xme |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .fnxmzz |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .wpkbi |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .gzgei |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .zep |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .viz |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .xqen |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .ouhvqw |
Source: Y1C20.tmp.5.dr |
Static PE information: section name: .ivx |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .crt1 |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: qwTG |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .lqen |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .vqb |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .gjd |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .wqhqlp |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .nulizw |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .fgrum |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .mjabqc |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .ghh |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .vrqcr |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .siorvl |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .sqgym |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .kqhrq |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .rsntf |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .iqt |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .kpwiuc |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .yuzcn |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .jbsbuw |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .mdjtj |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .mbjeh |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .amb |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .lac |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .zro |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .vtq |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .kyhoy |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .wvi |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .alzw |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .vdsoxe |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .pus |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .oqnl |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .ohjt |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .ofjxx |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .ifw |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .zktgse |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .pmd |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .kexxpw |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .kiqzd |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .uslf |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .zkkgx |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .phhwk |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .klf |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .xme |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .fnxmzz |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .wpkbi |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .gzgei |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .zep |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .viz |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .xqen |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .ouhvqw |
Source: vmqDDCE.tmp.5.dr |
Static PE information: section name: .dlt |
Source: phoneactivate.exe.19.dr |
Static PE information: section name: .imrsiv |
Source: SppExtComObj.Exe.30.dr |
Static PE information: section name: ?g_Encry |
Source: explorer.exe, 00000005.00000000.270853419.00000000080ED000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000 |
Source: explorer.exe, 00000005.00000000.270853419.00000000080ED000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: Prod_VMware_SATA |
Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m&ven_n |
Source: explorer.exe, 00000005.00000000.263094565.0000000000680000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: _VMware_SATA_CD00#5&280b647& |
Source: explorer.exe, 00000005.00000000.263115567.000000000069D000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: VMware SATA CD00 |
Source: explorer.exe, 00000005.00000000.303077563.00000000062C4000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e |
Source: explorer.exe, 00000005.00000000.284568857.0000000004287000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0 |
Source: explorer.exe, 00000005.00000000.271171855.000000000820E000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000 |
Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}^ |
Source: explorer.exe, 00000005.00000000.270853419.00000000080ED000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000 |
Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmp |
Binary or memory string: VMware SATA CD00l |