Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: wifeplasterbakewis.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: mealplayerpreceodsju.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: bordersoarmanusjuw.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: suitcaseacanehalk.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: absentconvicsjawun.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: pushjellysingeywus.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: economicscreateojsu.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: entitlementappwo.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: greetclassifytalk.shop |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: TeslaBrowser/5.5 |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: - Screen Resoluton: |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: - Physical Installed Memory: |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: Workgroup: - |
Source: 00000000.00000002.1312984869.0000000000D6C000.00000002.00000001.01000000.00000003.sdmp |
String decryptor: 4sxFKu--daili |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+0Ch] |
0_2_00D6AE30 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then inc ebx |
0_2_00D44F10 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+00000080h] |
0_2_00D512B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+70h] |
0_2_00D47239 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi] |
0_2_00D45390 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then inc ebx |
0_2_00D51670 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+08h] |
0_2_00D6B800 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+0Ch] |
0_2_00D65ACB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov eax, dword ptr [esp+10h] |
0_2_00D39D20 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp dword ptr [edi+esi*8], 18DC7455h |
0_2_00D51F80 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then test edi, edi |
0_2_00D6A0D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then jmp ecx |
0_2_00D4403B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movzx ebx, byte ptr [edx] |
0_2_00D62140 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esi+000001C0h] |
0_2_00D54240 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+04h] |
0_2_00D6822F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+04h] |
0_2_00D684D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movzx edx, byte ptr [esi+edi] |
0_2_00D325E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then jmp ecx |
0_2_00D46582 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [ebx], al |
0_2_00D54786 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
0_2_00D46A62 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [edx], al |
0_2_00D52B54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [edx], al |
0_2_00D52B70 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov dword ptr [esi+00000600h], 00000000h |
0_2_00D40C5B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [ecx], al |
0_2_00D46E69 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov dword ptr [esi+00000600h], 00000000h |
0_2_00D40F4D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+000008A0h] |
0_2_00D4EF19 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+18h] |
0_2_00D4D128 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movsx ecx, byte ptr [esi+eax] |
0_2_00D3D2C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], dx |
0_2_00D4B2A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], dx |
0_2_00D45216 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+0Ch] |
0_2_00D6B470 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+000000F0h] |
0_2_00D4347E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then xor eax, eax |
0_2_00D69461 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then inc ebx |
0_2_00D516CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then not ecx |
0_2_00D476E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
0_2_00D3F7CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+00000180h] |
0_2_00D41739 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp dword ptr [ebx+edi*8], 0AB35B01h |
0_2_00D43722 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], cx |
0_2_00D6799B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp word ptr [esi+edi+02h], 0000h |
0_2_00D4B930 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+70h] |
0_2_00D47A78 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], cx |
0_2_00D47BF5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+000008A0h] |
0_2_00D4FBB5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then push edi |
0_2_00D3FED9 |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.c.lencr.org/0 |
Source: file.exe, 00000000.00000003.1260454512.00000000042B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.i.lencr.org/0 |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: file.exe, 00000000.00000003.1261543303.00000000042A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700 |
Source: file.exe, 00000000.00000003.1261543303.00000000042A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: file.exe, 00000000.00000003.1261543303.00000000042A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg |
Source: file.exe, 00000000.00000003.1261543303.00000000042A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: file.exe, 00000000.00000002.1314082506.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1241403761.0000000001AE1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1233665196.0000000001B1A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/ |
Source: file.exe, 00000000.00000003.1312738112.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1314082506.0000000001B41000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/# |
Source: file.exe, 00000000.00000003.1241543550.0000000001B1A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1233665196.0000000001B1A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/J |
Source: file.exe, 00000000.00000003.1312738112.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1314082506.0000000001B41000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/S |
Source: file.exe, 00000000.00000003.1279661683.0000000001B63000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1241543550.0000000001B1A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1251431500.0000000001B46000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1312738112.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1314082506.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1279737181.0000000001B64000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1313859708.0000000001ADF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1233665196.0000000001B1A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/api |
Source: file.exe, 00000000.00000003.1312738112.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1314082506.0000000001B41000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/api- |
Source: file.exe, 00000000.00000003.1233665196.0000000001B1A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/apiTv |
Source: file.exe, 00000000.00000003.1312738112.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1314082506.0000000001B41000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/apion |
Source: file.exe, 00000000.00000003.1251431500.0000000001B46000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://greetclassifytalk.shop/~ |
Source: file.exe, 00000000.00000003.1261543303.00000000042A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi |
Source: file.exe, 00000000.00000003.1261182306.00000000043CC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: file.exe, 00000000.00000003.1261182306.00000000043CC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: file.exe, 00000000.00000003.1261543303.00000000042A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64 |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: file.exe, 00000000.00000003.1242991556.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1243190810.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1242877655.00000000042D9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: file.exe, 00000000.00000003.1261543303.00000000042A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr |
Source: file.exe, 00000000.00000003.1261182306.00000000043CC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: file.exe, 00000000.00000003.1261182306.00000000043CC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: file.exe, 00000000.00000003.1261182306.00000000043CC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: file.exe, 00000000.00000003.1261182306.00000000043CC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: file.exe, 00000000.00000003.1261182306.00000000043CC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D34C40 |
0_2_00D34C40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D55183 |
0_2_00D55183 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D51670 |
0_2_00D51670 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D31740 |
0_2_00D31740 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D45B57 |
0_2_00D45B57 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D51F80 |
0_2_00D51F80 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D40060 |
0_2_00D40060 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D38250 |
0_2_00D38250 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D34260 |
0_2_00D34260 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D66480 |
0_2_00D66480 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D36610 |
0_2_00D36610 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9487F |
0_2_00D9487F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D36C20 |
0_2_00D36C20 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D56E67 |
0_2_00D56E67 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D56FA0 |
0_2_00D56FA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D56F29 |
0_2_00D56F29 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D31000 |
0_2_00D31000 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6B130 |
0_2_00D6B130 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4D128 |
0_2_00D4D128 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D33370 |
0_2_00D33370 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6B470 |
0_2_00D6B470 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D516CE |
0_2_00D516CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D33770 |
0_2_00D33770 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D35890 |
0_2_00D35890 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4DD72 |
0_2_00D4DD72 |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D860FB push ebp; ret |
0_2_00E8B552 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C080 push ebp; ret |
0_2_00D7D8A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D86078 push edi; ret |
0_2_00D86079 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D84069 push esi; ret |
0_2_00FF976C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A1DF push esi; ret |
0_2_00D7A1E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C1F1 push edi; ret |
0_2_00D7C1F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A180 push esi; ret |
0_2_00D7A181 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8A186 push esi; ret |
0_2_00D8A187 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A115 push ebp; ret |
0_2_00D7A116 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D86138 push edi; ret |
0_2_00D86139 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D822C0 push esi; ret |
0_2_00FF7424 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C2F7 push edi; ret |
0_2_00D7C2F8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A240 push esi; ret |
0_2_00F4FDC6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A211 push edi; ret |
0_2_00D7A212 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A220 push ebp; ret |
0_2_0104357E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D823F8 push edi; ret |
0_2_00D823F9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D823F2 push esi; ret |
0_2_01036353 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A375 push esi; ret |
0_2_00F2675D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D82373 push edi; ret |
0_2_01075B7E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D82333 push esi; ret |
0_2_00F76D22 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A4DC push esi; ret |
0_2_00F73B91 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A4F9 push edi; ret |
0_2_00E65B87 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A4A6 push ebp; ret |
0_2_00D7A4A7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C445 push edi; ret |
0_2_00D7C446 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D82400 push esi; ret |
0_2_0109B676 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A11C push ebp; ret |
0_2_00E1B0F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A880 push edi; ret |
0_2_00E65B87 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C542 push ebp; ret |
0_2_00E70FF2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D88545 push ebp; ret |
0_2_00FB6D71 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C511 push edi; ret |
0_2_01053C73 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A528 push esi; ret |
0_2_00EC80F2 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive userers - NDCDYNVMware20,11696501413z |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: tasks.office.comVMware20,11696501413o |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: trackpan.utiitsl.comVMware20,11696501413h |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: netportal.hdfcbank.comVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: www.interactiveuserers.co.inVMware20,11696501413~ |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: dev.azure.comVMware20,11696501413j |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive userers - COM.HKVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1241185266.0000000001AEC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1313859708.0000000001A9E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1313859708.0000000001AEC000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Test URL for global passwords blocklistVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: secure.bankofamerica.comVMware20,11696501413|UE |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: bankofamerica.comVMware20,11696501413x |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Transaction PasswordVMware20,11696501413} |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Transaction PasswordVMware20,11696501413x |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: turbotax.intuit.comVMware20,11696501413t |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive userers - HKVMware20,11696501413] |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: outlook.office.comVMware20,11696501413s |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive userers - EU East & CentralVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252056688.00000000042AD000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: - GDCDYNVMware20,11696501413p |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: account.microsoft.com/profileVMware20,11696501413u |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive userers - GDCDYNVMware20,11696501413p |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Interactive userers - EU WestVMware20,11696501413n |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: ms.portal.azure.comVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Change Transaction PasswordVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: www.interactiveuserers.comVMware20,11696501413} |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: interactiveuserers.co.inVMware20,11696501413d |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: microsoft.visualstudio.comVMware20,11696501413x |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: global block list test formVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: outlook.office365.comVMware20,11696501413t |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Canara Change Transaction PasswordVMware20,11696501413^ |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: interactiveuserers.comVMware20,11696501413 |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: discord.comVMware20,11696501413f |
Source: file.exe, 00000000.00000003.1252339799.0000000004364000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: AMC password management pageVMware20,11696501413 |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\logins.json |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cert9.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\prefs.js |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\formhistory.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Electrum\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Electrum\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Ledger Live |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Ledger Live |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Binance |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Binance |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\GAOBCVIQIJ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\TQDFJHPUIU |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\ZIPXYXWIOY |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\ZQIXMVQGAH |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\GAOBCVIQIJ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\ZQIXMVQGAH |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\GAOBCVIQIJ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\TQDFJHPUIU |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\QNCYCDFIJJ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\PIVFAGEAAV |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\ZIPXYXWIOY |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Directory queried: C:\Users\user\Documents\PIVFAGEAAV |
Jump to behavior |