Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: wifeplasterbakewis.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: mealplayerpreceodsju.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: bordersoarmanusjuw.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: suitcaseacanehalk.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: absentconvicsjawun.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: pushjellysingeywus.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: economicscreateojsu.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: entitlementappwo.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: palmeventeryjusk.shop |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: TeslaBrowser/5.5 |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: - Screen Resoluton: |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: - Physical Installed Memory: |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: Workgroup: - |
Source: 00000000.00000002.2026163901.0000000002440000.00000004.00001000.00020000.00000000.sdmp |
String decryptor: pGlMMn--qb |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+08h] |
0_2_0239D23C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
0_2_02371209 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp word ptr [esi+edi+02h], 0000h |
0_2_0237D36C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movzx edx, byte ptr [esi+edi] |
0_2_0236401C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then not ecx |
0_2_0237911D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+18h] |
0_2_0237F11C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+00000180h] |
0_2_02373175 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp dword ptr [ebx+edi*8], 0AB35B01h |
0_2_0237515E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], cx |
0_2_02379631 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then inc ebx |
0_2_02383627 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov dword ptr [esi+00000600h], 00000000h |
0_2_02372697 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov eax, dword ptr [esp+10h] |
0_2_0236B75C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+70h] |
0_2_023794B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
0_2_0237849E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+0Ch] |
0_2_02397507 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [edx], al |
0_2_023845AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [edx], al |
0_2_02384590 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then jmp ecx |
0_2_02375A77 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then test edi, edi |
0_2_0239BB15 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movzx ebx, byte ptr [edx] |
0_2_02393B7C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+0Ch] |
0_2_0239C86C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [ecx], al |
0_2_023788A5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then push edi |
0_2_02371915 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+000008A0h] |
0_2_02380955 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then inc ebx |
0_2_0237694C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp dword ptr [edi+esi*8], 18DC7455h |
0_2_023839BC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov dword ptr [esi+00000600h], 00000000h |
0_2_02372989 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+000000F0h] |
0_2_02374EBA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+0Ch] |
0_2_0239CEAC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then xor eax, eax |
0_2_0239AE9D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+04h] |
0_2_02399F12 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then jmp ecx |
0_2_02377FBE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+70h] |
0_2_02378C75 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esi+000001C0h] |
0_2_02385C7C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], dx |
0_2_02376C52 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movsx ecx, byte ptr [esi+eax] |
0_2_0236ECFC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+00000080h] |
0_2_02382CEC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], dx |
0_2_0237CCDC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi] |
0_2_02376DCC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+00000080h] |
0_2_029012B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+70h] |
0_2_028F7239 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi] |
0_2_028F5390 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+0Ch] |
0_2_02915ACB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+08h] |
0_2_0291B800 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+0Ch] |
0_2_0291AE30 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp dword ptr [edi+esi*8], 18DC7455h |
0_2_02901F80 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then inc ebx |
0_2_028F4F10 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov eax, dword ptr [esp+10h] |
0_2_028E9D20 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], dx |
0_2_028FB2A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movsx ecx, byte ptr [esi+eax] |
0_2_028ED2C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], dx |
0_2_028F5216 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esi+000001C0h] |
0_2_02904240 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then test edi, edi |
0_2_0291A0D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then jmp ecx |
0_2_028F403B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movzx ebx, byte ptr [edx] |
0_2_02912140 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then not ecx |
0_2_028F76E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+18h] |
0_2_028FD6E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [ebx], al |
0_2_02904786 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
0_2_028EF7CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp dword ptr [ebx+edi*8], 0AB35B01h |
0_2_028F3722 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+00000180h] |
0_2_028F1739 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+04h] |
0_2_029184D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov edx, dword ptr [esp+0Ch] |
0_2_0291B470 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then xor eax, eax |
0_2_02919461 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+000000F0h] |
0_2_028F347E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then jmp ecx |
0_2_028F6582 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then movzx edx, byte ptr [esi+edi] |
0_2_028E25E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
0_2_028F6A62 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+70h] |
0_2_028F7A78 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov word ptr [eax], cx |
0_2_028F7BF5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then inc ebx |
0_2_02901BEB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [edx], al |
0_2_02902B54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [edx], al |
0_2_02902B70 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then cmp word ptr [esi+edi+02h], 0000h |
0_2_028FB930 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then push edi |
0_2_028EFED9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov byte ptr [ecx], al |
0_2_028F6E69 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov ecx, dword ptr [esi+000008A0h] |
0_2_028FEF19 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov dword ptr [esi+00000600h], 00000000h |
0_2_028F0F4D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 4x nop then mov dword ptr [esi+00000600h], 00000000h |
0_2_028F0C5B |
Source: Malware configuration extractor |
URLs: wifeplasterbakewis.shop |
Source: Malware configuration extractor |
URLs: mealplayerpreceodsju.shop |
Source: Malware configuration extractor |
URLs: bordersoarmanusjuw.shop |
Source: Malware configuration extractor |
URLs: suitcaseacanehalk.shop |
Source: Malware configuration extractor |
URLs: absentconvicsjawun.shop |
Source: Malware configuration extractor |
URLs: absentconvicsjawun.shop |
Source: Malware configuration extractor |
URLs: pushjellysingeywus.shop |
Source: Malware configuration extractor |
URLs: economicscreateojsu.shop |
Source: Malware configuration extractor |
URLs: entitlementappwo.shop |
Source: Malware configuration extractor |
URLs: palmeventeryjusk.shop |
Source: Malware configuration extractor |
URLs: wifeplasterbakewis.shop |
Source: Malware configuration extractor |
URLs: mealplayerpreceodsju.shop |
Source: Malware configuration extractor |
URLs: bordersoarmanusjuw.shop |
Source: Malware configuration extractor |
URLs: suitcaseacanehalk.shop |
Source: Malware configuration extractor |
URLs: absentconvicsjawun.shop |
Source: Malware configuration extractor |
URLs: absentconvicsjawun.shop |
Source: Malware configuration extractor |
URLs: pushjellysingeywus.shop |
Source: Malware configuration extractor |
URLs: economicscreateojsu.shop |
Source: Malware configuration extractor |
URLs: entitlementappwo.shop |
Source: Malware configuration extractor |
URLs: palmeventeryjusk.shop |
Source: Malware configuration extractor |
URLs: wifeplasterbakewis.shop |
Source: Malware configuration extractor |
URLs: mealplayerpreceodsju.shop |
Source: Malware configuration extractor |
URLs: bordersoarmanusjuw.shop |
Source: Malware configuration extractor |
URLs: suitcaseacanehalk.shop |
Source: Malware configuration extractor |
URLs: absentconvicsjawun.shop |
Source: Malware configuration extractor |
URLs: absentconvicsjawun.shop |
Source: Malware configuration extractor |
URLs: pushjellysingeywus.shop |
Source: Malware configuration extractor |
URLs: economicscreateojsu.shop |
Source: Malware configuration extractor |
URLs: entitlementappwo.shop |
Source: Malware configuration extractor |
URLs: palmeventeryjusk.shop |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.46.162.224 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.51.58.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.12.23.50 |
Source: global traffic |
HTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgSaEMC5GMvBs7EGIjBUDjoZOZwbbYOebWZ9rjzg1pIVUtCKWFvTZJyTatG-di6-kWgVSkMk4x6uhc1VAKAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: 1P_JAR=2024-04-27-11; NID=513=E5rhLSrnbfjRk46_dmtGnUqwPwi-mNxfINfN4owhq0ItG93yjm74EKSIboI2GbuuZy2nkvdCUEBUYg9CSinzaNpIviyv4g-zdR9EY5_nU28-231-CAbpyAdj6-Jj6y42jgmw20hQDtRudT_bcPFZ3vPv54iVARp7w4xpHjz1GVI |
Source: global traffic |
HTTP traffic detected: GET /sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgSaEMC5GMvBs7EGIjCXTsQ7Hz4Kgfi-FiRAT51_6pwZM6lLrAZbawdcw8AX8hoRf91oiReOlMqAgZsqCfUyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: 1P_JAR=2024-04-27-11; NID=513=kQC6D8SRkrtcp-Ak6hN6139KekVx3zhnDsBO5DsiJ9YDbwqMQ-N6a3Hqkivy0PHw9-eJ3x5r-5xCo2gnEOvmH3O-kQW_B1fyt7z_Em-HG3Cqp_wm97L3ppdQcG3KIgiluTIZwHftN_crK6YXUFLhYGNC9lJOV9dEbrQYPTrEHbs |
Source: global traffic |
HTTP traffic detected: GET /sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgSaEMC5GMvBs7EGIjA2UZwTDI9cbxIwnZske8EIQMZhE-XvCbuuLKQiNeKFWQoRwO1bxpkt2MlsnyAfg3kyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: 1P_JAR=2024-04-27-11; NID=513=N_zXEKVcGFSmGJnnf9NfxUQYajfRVtbCJ2yy8YIqZG0n-IE-5-6CcuJsdzHS69fS5Lo6qU6l4YiUp_b7kTJjGJdJDpCMMHkYMxbQvY6bAP4YLsOZcW5Y3kKcK6142ycJULOhE9dA5VMjK3BqAAFXra6F2xBdQGomvF0oNwd5oGw |
Source: global traffic |
HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=HaV2Hha+omFEa1E&MD=EgGFr8F4 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=HaV2Hha+omFEa1E&MD=EgGFr8F4 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: file.exe |
String found in binary or memory: http://www.innosetup.com/ |
Source: file.exe |
String found in binary or memory: http://www.remobjects.com/ps |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.c.lencr.org/0 |
Source: file.exe, 00000000.00000003.1955322058.0000000003229000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.i.lencr.org/0 |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: file.exe, 00000000.00000003.2024507652.000000000080A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1946746627.000000000080F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2024629586.00000000007AC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2025485076.00000000007B3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1946339615.0000000000812000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/ |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2024629586.00000000007D1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2025485076.00000000007D2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1946339615.00000000007D3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/01(P. |
Source: file.exe, 00000000.00000002.2025815738.000000000080F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2024507652.000000000080A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/= |
Source: file.exe, 00000000.00000002.2025815738.000000000080F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2024507652.000000000080A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/K |
Source: file.exe, 00000000.00000003.2024606062.0000000000804000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/api |
Source: file.exe, 00000000.00000003.1946746627.000000000080F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1946339615.000000000080F000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/api- |
Source: file.exe, 00000000.00000002.2025769616.0000000000808000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2024606062.0000000000804000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/apiE0 |
Source: file.exe, 00000000.00000003.1946339615.0000000000807000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/apimiga |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1946339615.00000000007C7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938933430.00000000007C7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop/g |
Source: file.exe, 00000000.00000002.2025282303.0000000000794000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://palmeventeryjusk.shop:443/api |
Source: file.exe, 00000000.00000003.1937619765.0000000003241000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.microsof |
Source: file.exe, 00000000.00000003.1956069685.000000000332B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: file.exe, 00000000.00000003.1956069685.000000000332B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: file.exe, 00000000.00000003.1937812498.0000000003216000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1937619765.0000000003241000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: file.exe, 00000000.00000003.1937812498.00000000031F2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: file.exe, 00000000.00000003.1937812498.0000000003216000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1937619765.0000000003241000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: file.exe, 00000000.00000003.1937812498.00000000031F2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: file.exe, 00000000.00000003.1937919553.000000000323B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1938232220.0000000003208000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: file.exe, 00000000.00000003.1956069685.000000000332B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: file.exe, 00000000.00000003.1956069685.000000000332B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: file.exe, 00000000.00000003.1956069685.000000000332B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: file.exe, 00000000.00000003.1956069685.000000000332B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: file.exe, 00000000.00000003.1956069685.000000000332B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49744 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49743 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49758 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49762 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49678 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49760 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49743 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49760 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49762 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49745 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49751 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49736 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49737 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49736 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49758 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49735 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49753 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49757 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49755 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49756 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49755 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49757 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49675 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49754 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49753 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49752 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49751 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49744 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49752 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49754 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49735 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49737 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49745 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49756 -> 443 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_023AF57F |
0_2_023AF57F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02360589 |
0_2_02360589 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_023672CC |
0_2_023672CC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0236804C |
0_2_0236804C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_023651AC |
0_2_023651AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0236667C |
0_2_0236667C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02377593 |
0_2_02377593 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02371A9C |
0_2_02371A9C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0239CB6C |
0_2_0239CB6C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02386BBF |
0_2_02386BBF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_023888A3 |
0_2_023888A3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02388965 |
0_2_02388965 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_023839BC |
0_2_023839BC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_023889DC |
0_2_023889DC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02397EBC |
0_2_02397EBC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0239CEAC |
0_2_0239CEAC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02365C9C |
0_2_02365C9C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02369C8C |
0_2_02369C8C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02364DAC |
0_2_02364DAC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02905183 |
0_2_02905183 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028F5B57 |
0_2_028F5B57 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02901F80 |
0_2_02901F80 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E4C40 |
0_2_028E4C40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E8250 |
0_2_028E8250 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E4260 |
0_2_028E4260 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E3370 |
0_2_028E3370 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E1000 |
0_2_028E1000 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028F0060 |
0_2_028F0060 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0291B130 |
0_2_0291B130 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E6610 |
0_2_028E6610 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E3770 |
0_2_028E3770 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02916480 |
0_2_02916480 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0291B470 |
0_2_0291B470 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E5890 |
0_2_028E5890 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02906E67 |
0_2_02906E67 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02906FA0 |
0_2_02906FA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_02906F29 |
0_2_02906F29 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_028E6C20 |
0_2_028E6C20 |
Source: unknown |
Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" |
|
Source: unknown |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:/// |
|
Source: unknown |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/ |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1984,i,17816864313725949295,15185844490458716427,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2004,i,15247930655043870069,15177389296022328392,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1984,i,17816864313725949295,15185844490458716427,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1984,i,17816864313725949295,15185844490458716427,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1984,i,17816864313725949295,15185844490458716427,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2004,i,15247930655043870069,15177389296022328392,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: msimg32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: Wallets/Electrum |
Source: file.exe, 00000000.00000003.1938084247.0000000000808000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: window-state.json |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: %appdata%\Exodus\exodus.wallet |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: ExodusWeb3 |
Source: file.exe, 00000000.00000002.2026917316.00000000028D8000.00000004.00000010.00020000.00000000.sdmp |
String found in binary or memory: Wallets/BinanceC:\Users\user\AppData\Roaming\Binance |
Source: file.exe, 00000000.00000003.1937668172.00000000007A9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: Wallets/Ethereum |
Source: file.exe, 00000000.00000003.1938084247.0000000000808000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: keystore |
Source: file.exe, 00000000.00000003.1937668172.00000000007BA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Electrum\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Electrum\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Ledger Live |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Ledger Live |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Binance |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Binance |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB |
Jump to behavior |