Source: BrowsingHistoryView.exe | virustotal: Detection: 12% | Perma Link |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_004098C4 FindFirstFileW,FindNextFileW, | 0_2_004098C4 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_004098C4 FindFirstFileW,FindNextFileW, | 0_1_004098C4 |
Source: BrowsingHistoryView.exe | String found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r |
Source: BrowsingHistoryView.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: BrowsingHistoryView.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: BrowsingHistoryView.exe | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: BrowsingHistoryView.exe | String found in binary or memory: http://www.nirsoft.net/ |
Source: BrowsingHistoryView.exe, 00000000.00000002.6158037759.0000000000197000.00000004.sdmp | String found in binary or memory: http://www.nirsoft.net46 |
Source: BrowsingHistoryView.exe, 00000000.00000002.6162528927.00000000025B7000.00000004.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ |
Source: BrowsingHistoryView.exe, 00000000.00000002.6162528927.00000000025B7000.00000004.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/strun/Be9 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0040F0E8 OpenClipboard, | 0_2_0040F0E8 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00409ED0 NtQuerySystemInformation,NtQuerySystemInformation, | 0_2_00409ED0 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00409F44 memset,CreateFileW,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,CloseHandle, | 0_2_00409F44 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00409ED0 NtQuerySystemInformation, | 0_1_00409ED0 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00432671 | 0_2_00432671 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00415063 | 0_2_00415063 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0043F014 | 0_2_0043F014 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0043A3EF | 0_2_0043A3EF |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0043D76D | 0_2_0043D76D |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_004217C9 | 0_2_004217C9 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_004079B6 | 0_2_004079B6 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00413ACB | 0_2_00413ACB |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0043BC0D | 0_2_0043BC0D |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0043AF50 | 0_2_0043AF50 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00432671 | 0_1_00432671 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00415063 | 0_1_00415063 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_0043F014 | 0_1_0043F014 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_0043A3EF | 0_1_0043A3EF |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_0043D76D | 0_1_0043D76D |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_004217C9 | 0_1_004217C9 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_004079B6 | 0_1_004079B6 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00413ACB | 0_1_00413ACB |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_0043BC0D | 0_1_0043BC0D |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_0043AF50 | 0_1_0043AF50 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 004087A3 appears 48 times | |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 004145EC appears 36 times | |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 00445240 appears 50 times | |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 00423B2E appears 86 times | |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 00444B8A appears 34 times | |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 00414A64 appears 156 times | |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 00414723 appears 56 times | |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: String function: 00415D16 appears 40 times | |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST |
Source: BrowsingHistoryView.exe | Binary or memory string: OriginalFileName vs BrowsingHistoryView.exe |
Source: BrowsingHistoryView.exe, 00000000.00000000.4919506235.0000000000446000.00000002.sdmp | Binary or memory string: )CREATE TABLE BINARYAUTOINCREMENT not allowed on WITHOUT ROWID tablesPRIMARY KEY missing on table %stableTABLECREATE %s %.*sUPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%dtbl_name='%q' AND type!='trigger'sqlite_stat%dDELETE FROM %Q.%s WHERE %s=%QDELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'sqlite_stattable %s may not be droppedtblforeign key on %s should reference only one column of table %Tnumber of columns in foreign key does not match the number of columns in the referenced tableunknown column "%s" in foreign key definitionindexcannot create a TEMP index on non-TEMP table "%s"altertab_table %s may not be indexedthere is already a table named %sindex %s already existssqlite_autoindex_%s_%dtable %s has no column named %sconflicting ON CONFLICT clauses specified UNIQUECREATE%s INDEX %.*sINSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);name='%q' AND type='index'no such index: %Sindex associated with UNIQUE or PRIMARY KEY constraint cannot be droppedDELETE FROM %Q.% |
Source: BrowsingHistoryView.exe, 00000000.00000002.6186558926.0000000004720000.00000002.sdmp | Binary or memory string: OriginalFilenameuser32j% vs BrowsingHistoryView.exe |
Source: BrowsingHistoryView.exe, 00000000.00000002.6186604645.0000000004730000.00000002.sdmp | Binary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs BrowsingHistoryView.exe |
Source: BrowsingHistoryView.exe | Binary or memory string: )CREATE TABLE BINARYAUTOINCREMENT not allowed on WITHOUT ROWID tablesPRIMARY KEY missing on table %stableTABLECREATE %s %.*sUPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%dtbl_name='%q' AND type!='trigger'sqlite_stat%dDELETE FROM %Q.%s WHERE %s=%QDELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'sqlite_stattable %s may not be droppedtblforeign key on %s should reference only one column of table %Tnumber of columns in foreign key does not match the number of columns in the referenced tableunknown column "%s" in foreign key definitionindexcannot create a TEMP index on non-TEMP table "%s"altertab_table %s may not be indexedthere is already a table named %sindex %s already existssqlite_autoindex_%s_%dtable %s has no column named %sconflicting ON CONFLICT clauses specified UNIQUECREATE%s INDEX %.*sINSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);name='%q' AND type='index'no such index: %Sindex associated with UNIQUE or PRIMARY KEY constraint cannot be droppedDELETE FROM %Q.% |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Section loaded: wow64log.dll | Jump to behavior |
Source: BrowsingHistoryView.exe | Binary string: i@1j@dk@c1Anetmsg.dllUnknown Error\Error %d: %seditkernel32.dll...open %2.2X %s (%s)%2.2d-%2.2d-%4.4d %2.2d:%2.2d:%2.2dSystemTimeToTzSpecificLocalTimeTzSpecificLocalTimeToSystemTime\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%d*URL index.datdllhost.exetaskhost.exetaskhostex.exetaskhostw.exeC:\bhvContainersContainerIdNameContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:captionmenu_%ddialog_%dstringsgeneralsysdatetimepick32rtlcharsetTranslatorNameTranslatorURLVersion0RTL_lng.ini"" |
Source: classification engine | Classification label: mal52.spyw.winEXE@1/0@0/0 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0041133B CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle, | 0_2_0041133B |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_004443FF CoCreateInstance, | 0_2_004443FF |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_004127EE FindResourceW,SizeofResource,LoadResource,LockResource, | 0_2_004127EE |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\places.sqlite-wal | Jump to behavior |
Source: BrowsingHistoryView.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | System information queried: HandleInformation | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: BrowsingHistoryView.exe | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: BrowsingHistoryView.exe | virustotal: Detection: 12% |
Source: BrowsingHistoryView.exe | String found in binary or memory: 3http://crl.usertrust.com/AddTrustExternalCARoot.crl05 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File opened: C:\Users\user\Desktop\BrowsingHistoryView.cfg | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Window found: window name: msctls_updown32 | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Window detected: Number of UI elements: 34 |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_CURSOR |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_BITMAP |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_ICON |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_MENU |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_DIALOG |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_STRING |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_ACCELERATOR |
Source: BrowsingHistoryView.exe | Static PE information: section name: RT_GROUP_ICON |
Source: BrowsingHistoryView.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: c:\Projects\VS2005\BrowsingHistoryView\Release\BrowsingHistoryView.pdb source: BrowsingHistoryView.exe |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0041153E LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_0041153E |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00445240 push eax; ret | 0_2_00445254 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00445240 push eax; ret | 0_2_0044527C |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00444EA1 push ecx; ret | 0_2_00444EB1 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00445240 push eax; ret | 0_1_00445254 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00445240 push eax; ret | 0_1_0044527C |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00444EA1 push ecx; ret | 0_1_00444EB1 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes | graph_0-35776 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 03h and CTI: jne 00403A46h | 0_2_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 02h and CTI: jne 00403A59h | 0_2_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 04h and CTI: jne 00403A82h | 0_2_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 05h and CTI: jne 00403A97h | 0_2_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 03h and CTI: jne 00403A46h | 0_1_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 02h and CTI: jne 00403A59h | 0_1_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 04h and CTI: jne 00403A82h | 0_1_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_00403A04 GetSystemTimeAsFileTime followed by cmp: cmp eax, 05h and CTI: jne 00403A97h | 0_1_00403A04 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_004098C4 FindFirstFileW,FindNextFileW, | 0_2_004098C4 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_1_004098C4 FindFirstFileW,FindNextFileW, | 0_1_004098C4 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_00417D72 memset,GetSystemInfo, | 0_2_00417D72 |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0041153E LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_0041153E |
Source: BrowsingHistoryView.exe, 00000000.00000002.6160611077.0000000000C90000.00000002.sdmp | Binary or memory string: Shell_TrayWnd |
Source: BrowsingHistoryView.exe, 00000000.00000002.6160611077.0000000000C90000.00000002.sdmp | Binary or memory string: Progman |
Source: BrowsingHistoryView.exe, 00000000.00000002.6160611077.0000000000C90000.00000002.sdmp | Binary or memory string: Program ManagerUR |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0040264F GetSystemTimeAsFileTime, | 0_2_0040264F |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | Code function: 0_2_0040876E GetVersionExW, | 0_2_0040876E |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\places.sqlite-wal | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\places.sqlite-shm | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\BrowsingHistoryView.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini | Jump to behavior |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.