Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Jump to behavior |
Source: 1234.js |
Argument value : ['"function lPad(str,pad_char,pad_len){var o="";var i=0;while(i<pad_len-str.toString().length){o=o+pad'] |
Go to definition |
Source: 1234.js |
Argument value : ['"1n 19(28,3y,3A){q o="";q i=0;28F(i<3A-28.28E().28D){o=o+3y;i++}o=o+28;3w(o)}1n 25(t){q 11,27;11=19(', '"function lPad(str,pad_char,pad_len){var o="";var i=0;while(i<pad_len-str.toString().length){o=o+pad'] |
Go to definition |
Source: 1234.js |
Argument value : ['"1n 19(28,3y,3A){q o="";q i=0;28F(i<3A-28.28E().28D){o=o+3y;i++}o=o+28;3w(o)}1n 25(t){q 11,27;11=19(', '"function lPad(str,pad_char,pad_len){var o="";var i=0;while(i<pad_len-str.toString().length){o=o+pad'] |
Go to definition |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.161.251.26 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A511C40 LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,InternetOpenW,InternetSetOptionW,InternetSetOptionW,InternetSetOptionW,InternetConnectW,HttpOpenRequestW,SetLastError,HttpSendRequestW,GetLastError,InternetQueryOptionW,InternetSetOptionW,HttpSendRequestW,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, |
11_2_00007FFE1A511C40 |
Source: rundll32.exe, 0000000B.00000002.2968427951.000002D3EEFAC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.2968427951.000002D3EEFD3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.2968427951.000002D3EEF18000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://185.161.251.26/ |
Source: rundll32.exe, 0000000B.00000002.2968427951.000002D3EEF18000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://185.161.251.26/0 |
Source: rundll32.exe, 0000000B.00000002.2968427951.000002D3EEF7A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://185.161.251.26/I |
Source: rundll32.exe, 0000000B.00000002.2968427951.000002D3EEF18000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://185.161.251.26/O&= |
Source: rundll32.exe, 0000000B.00000002.2968427951.000002D3EEFAC000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://185.161.251.26/P |
Source: rundll32.exe, 0000000B.00000002.2968427951.000002D3EEFD3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://185.161.251.26/nfoEx2 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A511C40 |
11_2_00007FFE1A511C40 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A5145E0 |
11_2_00007FFE1A5145E0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A5168A0 |
11_2_00007FFE1A5168A0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A512C40 |
11_2_00007FFE1A512C40 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A513F30 |
11_2_00007FFE1A513F30 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A51CD38 |
11_2_00007FFE1A51CD38 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A523508 |
11_2_00007FFE1A523508 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A51B310 |
11_2_00007FFE1A51B310 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A5218C0 |
11_2_00007FFE1A5218C0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A51EFB0 |
11_2_00007FFE1A51EFB0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A511990 |
11_2_00007FFE1A511990 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A515160 |
11_2_00007FFE1A515160 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A518F68 |
11_2_00007FFE1A518F68 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A513170 |
11_2_00007FFE1A513170 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A522578 |
11_2_00007FFE1A522578 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A522D5C |
11_2_00007FFE1A522D5C |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A5221C8 |
11_2_00007FFE1A5221C8 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 11_2_00007FFE1A517740 CoInitializeEx,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,SysAllocString,SysAllocString,SysFreeString,SysFreeString,VariantClear,VariantClear,VariantClear,VariantClear,CoUninitialize, |
11_2_00007FFE1A517740 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2200:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6508:120:WilError_03 |
Source: C:\Windows\System32\msiexec.exe |
Mutant created: \Sessions\1\BaseNamedObjects\461592c6-32a2-4a5a-9542-783ba1348002 |
Source: C:\Windows\System32\rundll32.exe |
Mutant created: \Sessions\1\BaseNamedObjects\5bba9e40-0e32-4b7f-b39a-667bbc0c2293 |
Source: unknown |
Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1234.js" |
Source: unknown |
Process created: C:\Windows\System32\certutil.exe C:\Windows\system32\certutil.EXE -decode rad603BF.tmp rad00257.tmp |
Source: C:\Windows\System32\certutil.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: unknown |
Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.EXE /y C:\Users\user\AppData\Local\Temp\rad00257.tmp |
Source: unknown |
Process created: C:\Windows\System32\certutil.exe C:\Windows\system32\certutil.EXE -decode rad603BF.tmp rad00257.tmp |
Source: C:\Windows\System32\certutil.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: unknown |
Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.EXE /y C:\Users\user\AppData\Local\Temp\rad00257.tmp |
Source: unknown |
Process created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe "C:\ProgramData\Tyrannosaurus Tech\Updater.dll",Start /u |
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: jscript.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: taskschd.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: xmllite.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: certcli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: cryptui.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: ntdsapi.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: certca.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: samcli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: logoncli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: dsrole.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: aclayers.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: sfc.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: certcli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: cabinet.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: cryptui.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: certca.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: ntdsapi.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: samcli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: logoncli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: dsrole.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\certutil.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: aclayers.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: sfc.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: mstask.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: taskschd.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
Section loaded: mpr.dll |
Jump to behavior |