Click to jump to signature section
Source: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\$dpx$.tmp\8f876ac57673f1439e1ebba93c31a9f1.tmp | ReversingLabs: Detection: 26% |
Source: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\setup.exe (copy) | ReversingLabs: Detection: 26% |
Source: C:\Windows\System32\msiexec.exe | File opened: z: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: x: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: v: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: t: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: r: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: p: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: n: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: l: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: j: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: h: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: f: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: b: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: y: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: w: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: u: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: s: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: q: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: o: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: m: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: k: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: i: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: g: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: e: | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | File opened: c: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: a: | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\ | Jump to behavior |
Source: cmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499490988.000000000041B000.00000004.00000010.00020000.00000000.sdmp, msiwrapper.ini.5.dr | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf |
Source: cmd.exe, 0000000A.00000002.499548798.00000000007B0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499525523.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfC: |
Source: cmd.exe, 0000000A.00000002.499405583.0000000000150000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfROCESSOR_ARCHITECT |
Source: cmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfr |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\45aee5.msi | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\SourceHash{837A37B6-C086-4887-960B-B6BB04303EFC} | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\45aee6.ipi | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\45aee6.ipi | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File created: C:\Windows\Installer\MSI93A8.tmp | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | File created: C:\Windows\Logs\DPX\setupact.log | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | File created: C:\Windows\Logs\DPX\setuperr.log | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ................................ 42.....(.P.....................p........e......................................................`............... | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ................................ 42.....(.P..............................e..............................................v....................... | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Console Write: ................................................................_B.s.......................s....n..s....................R.................A..... | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ................\...............0.'.....(.P.......................................................'.............................N..s............ | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ................\...............:. .....(.P.......................................................'...............'............................. | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ................................ 4A.....(.P.............................%.......................0...0...................X.......0.'.......'..... | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Console Write: ................................ 4A.....(.P.............................,.......................0...0...................v....................... | Jump to behavior |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\33abb.msi" | |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BB | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGH | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files" | |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOW | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BB | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGH | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files" | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOW | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: rpcrtremote.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msihnd.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: rpcrtremote.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: spp.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: bcrypt.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: rpcrtremote.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: dpx.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Section loaded: wdscore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wdi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\icacls.exe | Section loaded: wow64cpu.dll | Jump to behavior |
Source: 8f876ac57673f1439e1ebba93c31a9f1.tmp.8.dr | Static PE information: section name: .00cfg |
Source: 8f876ac57673f1439e1ebba93c31a9f1.tmp.8.dr | Static PE information: section name: .voltbl |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\expand.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\setup.exe (copy) | Jump to dropped file |
Source: C:\Windows\SysWOW64\expand.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\$dpx$.tmp\8f876ac57673f1439e1ebba93c31a9f1.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe | Dropped PE file which has not been started: C:\Windows\Installer\MSI93A8.tmp | Jump to dropped file |
Source: C:\Windows\System32\msiexec.exe TID: 3412 | Thread sleep time: -120000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe TID: 4080 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe TID: 3444 | Thread sleep time: -360000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3764 | Thread sleep time: -180000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3904 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe TID: 4004 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File Volume queried: C:\ FullSizeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\ | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BB | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGH | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files" | Jump to behavior |
Source: C:\Windows\SysWOW64\msiexec.exe | Process created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOW | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |