Click to jump to signature section
Source: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\$dpx$.tmp\82ea3633dcdfab4682fadb28c07af4a4.tmp | ReversingLabs: Detection: 31% |
Source: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\install86.exe (copy) | ReversingLabs: Detection: 31% |
Source: C:\Windows\System32\msiexec.exe | File opened: z: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: x: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: v: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: t: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: r: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: p: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: n: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: l: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: j: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: h: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: f: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: b: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: y: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: w: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: u: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: s: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: q: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: o: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: m: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: k: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: i: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: g: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: e: | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | File opened: c: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: a: | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\ | Jump to behavior |
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517808175.000000000043B000.00000004.00000010.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517906718.00000000009E0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmp, msiwrapper.ini.5.dr | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf |
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517828418.00000000005A0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfC: |
Source: cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfD |
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfQ |
Source: cmd.exe, 0000000A.00000002.517906718.00000000009E0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfROCESSOR_ARCHITECT |
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfrT |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\72dbb0.msi | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\SourceHash{740864D8-D5D4-4230-8D1D-1C2E0E22C8A6} | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\72dbb1.ipi | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\72dbb1.ipi | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSIEFBD.tmp | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | File created: C:\Windows\Logs\DPX\setupact.log | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | File created: C:\Windows\Logs\DPX\setuperr.log | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: .. ................... ......... 46.....(.P..............................x......................0................. ............................. | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: .. ................... ......... 46.....(.P..............................x......................0................. .....v................. ..... | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Console Write: ................................................................_B.s.......................s....n..s....................R.................C..... | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ........................................(.P.....................P.......z.......................(...............................N..s............ | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ................................:. .....(.P.....................P...............................(............................................... | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ....................L........... 4$.....(.P.....................P...............................0...0...................X....................... | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ....................L........... 4$.....(.P.....................P...............................0...0...................v....................... | Jump to behavior |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\56ff7c.msi" | |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6 | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files" | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOW | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files" | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOW | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: rpcrtremote.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msihnd.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: rpcrtremote.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: bcrypt.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: rpcrtremote.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: dpx.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: wdscore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wdi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: 82ea3633dcdfab4682fadb28c07af4a4.tmp.8.dr | Static PE information: section name: .00cfg |
Source: 82ea3633dcdfab4682fadb28c07af4a4.tmp.8.dr | Static PE information: section name: .voltbl |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\$dpx$.tmp\82ea3633dcdfab4682fadb28c07af4a4.tmp | Jump to dropped file |
Source: C:\Windows\SysWOW64\expand.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\install86.exe (copy) | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | Dropped PE file which has not been started: C:\Windows\Installer\MSIEFBD.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe TID: 3428 | Thread sleep time: -120000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe TID: 4048 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe TID: 3468 | Thread sleep time: -240000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3792 | Thread sleep time: -180000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3932 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe TID: 3968 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\ | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6 | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files" | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOW | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |